Ahuja, CA
Alok Ahuja, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20140187331 | LATENCY REDUCTION BY SUB-FRAME ENCODING AND TRANSMISSION - A cloud gaming system includes a cloud gaming server that provides rendering for a video frame employed in cloud gaming. The cloud gaming system also includes a video frame latency reduction pipeline coupled to the cloud gaming server, having a slice generator that provides a set of separately-rendered video frame slices required for a video frame, a slice encoder that encodes each of the set of separately-rendered video frame slices into corresponding separately-encoded video frame slices of the video frame and a slice packetizer that packages each separately-encoded video frame slice into slice transmission packets. The cloud gaming system further includes a cloud network that transmits the slice transmission packets and a cloud gaming client that processes the slice transmission packets to construct the video frame. A video frame latency reduction method is also provided. | 07-03-2014 |
20140195598 | SYSTEM AND METHOD FOR COMPUTER PERIPHERAL ACCESS FROM CLOUD COMPUTING DEVICES - A method includes monitoring data communicated over a bus and determining that the data is communicated between a peripheral device and a client device. The method also includes sending the data in an unaltered form, and an identifier identifying the peripheral device, to a cloud server, wherein the data is operable to be received by a device driver executing on the cloud server. Another method includes receiving data in an unaltered form and an identifier identifying a peripheral device, wherein the unaltered data is a forwarded communication between the peripheral device and a client device. The method also includes enabling a device driver based on the received identifier. The method also includes executing one or more commands via the device driver, based on the received data. | 07-10-2014 |
Alok Ahuja, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130007888 | SYSTEM AND METHOD FOR PRIVATE INFORMATION COMMUNICATION FROM A BROWSER TO A DRIVER - Systems and methods for communicating private information from a browser to a driver are presented. The private information communication method can comprise: performing a private information communication process in which private information is communicated through a private information communication plug-in of a browser to a driver; and performing a driver process based upon the private communication information communicated in the private information communication process. The private information communication process can comprise determining private information content; communicating the private information to the private information communication plug-in coupled to a private communication channel; calling a graphics driver from the private information communication plug-in using the private communication channel; and forwarding the private information from the private information communication plug to the driver via the private communication channel. The driver process can comprise: determining if there is an association between normal information and the private information, and processing the normal information in accordance with associated private. The private information can be associated with stereoscopic | 01-03-2013 |
20140195594 | METHOD AND SYSTEM FOR DISTRIBUTED PROCESSING, RENDERING, AND DISPLAYING OF CONTENT - A system and method for distributed processing, rendering, and displaying of content. A first client request is received from a first client of a plurality of clients. The first client request is authenticated from the first client of the plurality of clients. A first data stream type is determined, based on the first client request, to establish with the first client of the plurality of clients. The first session comprising the first data type is established, based on a determination of the first data stream type, with the first client of the plurality of clients. The data of the first stream data type is provided for the first session to the first client of the plurality of clients. | 07-10-2014 |
20140195912 | METHOD AND SYSTEM FOR SIMULTANEOUS DISPLAY OF VIDEO CONTENT - An apparatus including: a receiving module operable to receive video content through a communication network simultaneously from a set of devices; a decoding module operable to decode the received video content from the set of devices into decoded video content; an arranging module operable to combine and arrange the decoded video content into a single video; and a displaying module operable to provide the single video for display on a display device. | 07-10-2014 |
Arun Ahuja, Thousand Oaks, CA US
Patent application number | Description | Published |
---|---|---|
20110307366 | METHOD AND SYSTEM FOR NOTIFYING CUSTOMERS OF TRANSACTION OPPORTUNITIES - A standalone notification system, including a notification server which generates electronic messages for alerting customers of potentially fraudulent activity on one or more of their financial accounts. Alternatively, or in addition thereto, the notification system may be used to forward transaction code(s) to customers for verification of a request for high risk transaction(s) with respect to a customer's financial account. The transaction code is generated in response to a high risk transaction request and sent to through an identified customer notification means, e.g., e-mail, short message service (“SMS”), facsimile, mobile phone, telephone, etc. The customer must enter the transaction code within a predetermined amount of time in order to verify the high-risk transaction request. | 12-15-2011 |
Ashish Ahuja, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20100057166 | System and Method for Measuring and Fitting Spatio-Temporal Vision - This system gives the experimenter great flexibility to present spatio-temporal stimulation patterns to a subject. A video configuration file (VCF) editor allows the experimenter to determine the electrical stimulation parameters for each electrode. A Pattern Stimulation software program allows direct stimulation of chosen patterns of electrodes, scaled by the subject's VCF, through a Graphical User Interface. The subject then responds by drawing the outline of the phosphene he or she perceives on a touchscreen. The Pattern Stimulation program saves all of the trial parameters and the parameters of an ellipse fit to their drawing, as well as a raw data file containing the input to the touchscreen is saved. After the experiment, offline image analysis can be performed to obtain a detailed quantitative description of the subject's percepts. Image descriptors can assigned to the touchscreen data; these image descriptors can be used to make formalized comparisons between various experimental conditions. Various types of image descriptors can be used, including simple ellipse fitting, projections of the 2-D drawings onto one-dimensional axes, calculations of Hu moments, PCA, and ICA. | 03-04-2010 |
20120009159 | BIOCOMPATIBLE SUBSTRATE FOR FACILITATING INTERCONNECTIONS BETWEEN STEM CELLS AND TARGET TISSUES AND METHODS FOR IMPLANTING SAME - Disclosed herein are substrates for cell delivery to target tissues requiring treatment for various diseases that induce cell death, damage or loss of function. The substrates are configured to provide seeded cells, including stem cells, with a structural support that allows interconnection with and transmission of biological signals between the cells and the target tissue. | 01-12-2012 |
20120123501 | Visual Prosthesis with an Improved Electrode Array Adapted for Foveal Stimulation - The present invention is an improved method of electrically stimulating percepts in a patient with a visual prosthesis, to induce a more controlled perception of light. In particular, the present invention is an improved electrode array to maximize retinal response. The array of the present invention is an array with a center section with no electrode, surrounded by a ring of small high density electrodes. Electrodes beyond to ring are gradually larger and more widely spaced. | 05-17-2012 |
20140309710 | Visual Prosthesis with an Improved Electrode Array Adapted for Foveal Stimulation - The present invention is an improved method of electrically stimulating percepts in a patient with a visual prosthesis, to induce a more controlled perception of light. In particular, the present invention is an improved electrode array to maximize retinal response. The array of the present invention is an array with a center section with no electrode, surrounded by a ring of small high density electrodes. Electrodes beyond to ring are gradually larger and more widely spaced. | 10-16-2014 |
20150147377 | BIOCOMPATIBLE SUBSTRATE FOR FACILITATING INTERCONNECTIONS BETWEEN STEM CELLS AND TARGET TISSUES AND METHODS FOR IMPLANTING SAME - Disclosed herein are substrates for cell delivery to target tissues requiring treatment for various diseases that induce cell death, damage or loss of function. The substrates are configured to provide seeded cells, including stem cells, with a structural support that allows interconnection with and transmission of biological signals between the cells and the target tissue. | 05-28-2015 |
Ashish Ahuja, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20160139413 | WIDE FIELD OF VIEW HEAD MOUNTED DISPLAY APPARATUSES, METHODS AND SYSTEMS - In one general aspect, an optical system for a head mounted display system is provided. The optical system includes an image source and an optical component. The optical component includes a reflective surface configured to receive an image from the image source, the optical component having a specified curvature that reflects and presents the image to a user of the head mounted display. | 05-19-2016 |
Ashish Ahuja, Portola Valley, CA US
Patent application number | Description | Published |
---|---|---|
20150309009 | SYSTEMS AND METHODS FOR IN VITRO AND IN VIVO IMAGING OF CELLS ON A SUBSTRATE - Disclosed herein are generally to methods and systems that facilitate imaging of cells on a substrate and more particularly to pre-implantation (in vitro) and post-implantation (in vivo) imaging of cell-seeded substrates implanted in target tissues in the context of stem cell therapy. | 10-29-2015 |
Chetan Ahuja, Burlingame, CA US
Patent application number | Description | Published |
---|---|---|
20150245224 | METHODS AND SYSTEMS OF INTERNET PROTOCOL OPTIMIZATION FOR CELLULAR DATA NETWORKS - In one aspect, a method includes detecting that a mobile device application in a mobile device has generated a TCP based protocol request. The TCP based protocol request is automatically converted by the mobile device to a cellular-data network protocol request with the mobile device application. Two or more IP proxy servers are identified. Wherein the two or more IP proxy servers provide internet access to a mobile device via a cellular data network. A list of physical locations of each of the two or more IP proxy servers is generated. A location of the mobile device is calculated. A distance between the mobile device and each of the two or more IP proxy servers is automatically determined. A step includes selecting a physically nearest IP proxy server of the two or more internet protocol (IP) proxy servers to the mobile device. A step includes communicating the cellular-data network protocol request to the physically nearest IF proxy server via, at least in part, the cellular data network. | 08-27-2015 |
20160088675 | MAINTAINING CONTINUOUS SESSIONS IN CELLULAR DATA NETWORKS - In one aspect, the application running on mobile device creates a unique identifier. This unique identifier acts as the “permanent address” for sending packets from the proxy server to the mobile application. The current IP address of the device is used as a “temporary forwarding address” for the packet. When the IP address of the mobile device changes, the application on the device quickly informs the proxy server about this change. This allows the proxy server to continue sending the remaining data of this download session to the newly acquired IP address without having to restart the entire download session from scratch. | 03-24-2016 |
Dheeraj Ahuja, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20120062702 | ONLINE REFERENCE GENERATION AND TRACKING FOR MULTI-USER AUGMENTED REALITY - A multi-user augmented reality (AR) system operates without a previously acquired common reference by generating a reference image on the fly. The reference image is produced by capturing at least two images of a planar object and using the images to determine a pose (position and orientation) of a first mobile platform with respect to the planar object. Based on the orientation of the mobile platform, an image of the planar object, which may be one of the initial images or a subsequently captured image, is warped to produce the reference image of a front view of the planar object. The reference image may be produced by the mobile platform or by, e.g., a server. Other mobile platforms may determine their pose with respect to the planar object using the reference image to perform a multi-user augmented reality application. | 03-15-2012 |
20120269388 | ONLINE REFERENCE PATCH GENERATION AND POSE ESTIMATION FOR AUGMENTED REALITY - A reference patch of an unknown environment is generated on the fly for positioning and tracking. The reference patch is generated using a captured image of a planar object with two perpendicular sets of parallel lines. The planar object is detected in the image and axes of the world coordinate system are defined using the vanishing points for the two sets of parallel lines. The camera rotation is recovered based on the defined axes, and the reference patch of at least a portion of the image of the planar object is generated using the recovered camera rotation. The reference patch can then be used for vision based detection and tracking. The planar object may be detected in the image as sets of parallel lines or as a rectangle. | 10-25-2012 |
20130063589 | RESOLVING HOMOGRAPHY DECOMPOSITION AMBIGUITY BASED ON ORIENTATION SENSORS - A homography between two captured images of a planar object is decomposed into at least one possible solution, and typically at least two ambiguous solutions. The ambiguity between the two solutions is removed, or a single solution validated, using measurements from orientation sensors. The measurements from orientation sensors may be used by comparing at least one of the yaw, pitch, and/or roll angles derived from a relative rotation matrix for the one or more solutions to a corresponding at least one of the yaw, pitch, and/or roll angles derived from the measurements from the orientation sensors. | 03-14-2013 |
20130064421 | RESOLVING HOMOGRAPHY DECOMPOSITION AMBIGUITY BASED ON VIEWING ANGLE RANGE - The homography between captured images of a planar object is determined and decomposed into at least one possible solution, and typically at least two ambiguous solutions. The removal of the ambiguity between the two solutions, or validation of a single solution, is performed using a viewing angle range. The viewing angle range may be used by comparing the viewing angle range to the orientation of each solution as derived from the rotation matrix resulting from the homography decomposition. Any solution with an orientation outside the viewing angle range may be eliminated as a solution. | 03-14-2013 |
20140368645 | ROBUST TRACKING USING POINT AND LINE FEATURES - Disclosed embodiments pertain to apparatus, systems, and methods for robust feature based tracking. In some embodiments, a score may be computed for a camera captured current image comprising a target object. The score may be based on one or more metrics determined from a comparison of features in the current image and a prior image captured by the camera. The comparison may be based on an estimated camera pose for the current image. In some embodiments, one of a point based, an edge based, or a combined point and edge based feature correspondence method may be selected based on a comparison of the score with a point threshold and/or a line threshold, the point and line thresholds being obtained from a model of the target. The camera pose may be refined by establishing feature correspondences using the selected method between the current image and a model image. | 12-18-2014 |
20140369557 | Systems and Methods for Feature-Based Tracking - Disclosed embodiments pertain to feature based tracking. In some embodiments, a camera pose may be obtained relative to a tracked object in a first image and a predicted camera pose relative to the tracked object may be determined for a second image subsequent to the first image based, in part, on a motion model of the tracked object. An updated SE(3) camera pose may then be obtained based, in part on the predicted camera pose, by estimating a plane induced homography using an equation of a dominant plane of the tracked object, wherein the plane induced homography is used to align a first lower resolution version of the first image and a first lower resolution version of the second image by minimizing the sum of their squared intensity differences. A feature tracker may be initialized with the updated SE(3) camera pose. | 12-18-2014 |
20150193935 | ONLINE REFERENCE GENERATION AND TRACKING FOR MULTI-USER AUGMENTED REALITY - A multi-user augmented reality (AR) system operates without a previously acquired common reference by generating a reference image on the fly. The reference image is produced by capturing at least two images of a planar object and using the images to determine a pose (position and orientation) of a first mobile platform with respect to the planar object. Based on the orientation of the mobile platform, an image of the planar object, which may be one of the initial images or a subsequently captured image, is warped to produce the reference image of a front view of the planar object. The reference image may be produced by the mobile platform or by, e.g., a server. Other mobile platforms may determine their pose with respect to the planar object using the reference image to perform a multi-user augmented reality application. | 07-09-2015 |
Disha Ahuja, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20120075440 | ENTROPY BASED IMAGE SEPARATION - Entropy based image segmentation determines entropy values for pixels in an image based on intensity or edge orientation. One or more threshold values are determined as a fraction of the entropy distribution over the image. For example, high and/or low thresholds may be generated to identify regions in the image associated with trees or sky, respectively. The entropy values are compared to the threshold(s) from which regions within the image can be segmented. Intensity based entropy has no structural information, and thus, proximity based clustering and pruning of the entropy points is performed. A mask may be applied to the segmented regions to remove the regions from the image, which is useful in, e.g., objection recognition processes. Additionally, separate buildings may be identified and segmented using edge orientation entropy with clustering and pruning. | 03-29-2012 |
Disha Ahuja, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140143579 | SEQUENTIAL FEATURE COMPUTATION FOR POWER EFFICIENT CLASSIFICATION - Disclosed is an apparatus and method for power efficient processor scheduling of features. In one embodiment, features may be scheduled for sequential computing, and each scheduled feature may receive a sensor data sample as input. In one embodiment, scheduling may be based at least in part on each respective feature's estimated power usage. In one embodiment, a first feature in the sequential schedule of features may be computed and before computing a second feature in the sequential schedule of features, a termination condition may be evaluated. | 05-22-2014 |
20140168057 | GYRO AIDED TAP GESTURE DETECTION - Methods, systems, computer-readable media, and apparatuses for tap detection in a mobile device are presented. In some embodiments, the method may comprise storing, by a mobile device, a first data sample from an accelerometer sensor and a second data sample from a gyroscope sensor. Additionally, the method may comprise processing a plurality of data samples. The plurality of data samples can include the first data sample or the second data sample. Optionally, in one embodiment, the method may comprise suppressing a tap that has been classified as a false detection based on at least one of the plurality of data samples. Subsequently, the method may comprise determining an occurrence of a tap at a mobile device based on the results of the processing. | 06-19-2014 |
20140180621 | SWING COMPENSATION IN STEP DETECTION - Step detection accuracy in mobile devices is increased by determining whether swinging is taking place. According to the invention, swinging can be detected using threshold detection, Eigen analysis, hybrid frequency analysis, and/or gyroscope-based analysis, for example. The determination that swinging is (or may be) occurring can impact how the mobile device reports detected steps for step detection. A count of missteps and/or a level of certainty, based on swing detection, can be provided with a step count. | 06-26-2014 |
20140269363 | IN-TRANSIT DETECTION USING LOW COMPLEXITY ALGORITHM FUSION AND PHONE STATE HEURISTICS - System and methods are disclosed to use information available on the state of mobile devices in a heuristics-based approach to improve motion state detection. In one or more embodiments, information on the WiFi connectivity of mobile devices may be used to improve the detection of the in-transit state. The WiFi connectivity information may be used with sensor signal such as accelerometer signals in a motion classifier to reduce the false positives of the in-transit state. In one or more embodiments, information that a mobile device is connected to a WiFi access point (AP) may be used as heuristics to reduce the probability of falsely classifying the mobile device in the in-transit state when mobile device is actually in the hand of a relatively stationary user. Information on the battery charging state or the wireless connectivity of the mobile devices may also be used to improve the detection of in-transit state. | 09-18-2014 |
Disha Ahuja, Campbell, CA US
Patent application number | Description | Published |
---|---|---|
20120173190 | INERTIAL SENSOR AIDED HEADING AND POSITIONING FOR GNSS VEHICLE NAVIGATION - An apparatus and method for providing an improved heading estimate of a mobile device in a vehicle is presented. First, the mobile device determines if it is mounted in a cradle attached to the vehicle; if so, inertia sensor data may be valid. While in a mounted stated, the mobile device determines whether it has been rotated in the cradle; if so, inertia sensor data may no longer be reliable and a recalibration to determine a new relative orientation between the vehicle and the mobile device is needed. If the mobile device is mounted and not recently rotated, heading data from multiple sensors (e.g., GPS, gyroscope, accelerometer) may be computed and combined to form the improved heading estimate. This improved heading estimate may be used to form an improved velocity estimate. The improved heading estimate may also be used to compute a bias to correct a gyroscope. | 07-05-2012 |
20130110439 | SYSTEM AND METHOD FOR IMPROVING ORIENTATION DATA | 05-02-2013 |
20130121367 | SENSOR AUTO-CALIBRATION - Aspects of the disclosure relate to computing technologies. In particular, aspects of the disclosure relate to mobile computing device technologies, such as systems, methods, apparatuses, and computer-readable media for improving calibration data by increasing the diversity of orientations used for generating the calibration data. In one embodiment, the computing device receives a plurality of calibration measurements associated with one or more sensors of a device, determines a degree to which the plurality of calibration measurements were captured at different orientations of the device, and determines, based on the degree, whether to update one or more calibration parameters. | 05-16-2013 |
20130124126 | SENSOR AUTO-CALIBRATION - Aspects of the disclosure relate to computing technologies. In particular, aspects of the disclosure relate to mobile computing device technologies, such as systems, methods, apparatuses, and computer-readable media for scheduling an execution of a task, such as a non-real time, non-latency sensitive background task on a computing device. In one implementation, the technique includes detecting a first state of a device, wherein the first state of the device is associated with a first power level and a first task, wherein the first power level is at least partially based on power consumption of a first task, determining that the first power level associated with the first state is above a threshold, and in response to determining that the first power level associated with the first state is above the threshold, and scheduling an execution of a second task on the device, wherein the second task is associated with automatically collecting of calibration data using at least one sensor. | 05-16-2013 |
20130124127 | SENSOR AUTO-CALIBRATION - Aspects of the disclosure relate to computing technologies. In particular, aspects of the disclosure relate to mobile computing device technologies, such as systems, methods, apparatuses, and computer-readable media to improve the calibration data by taking into account the effects of change in temperature on motion sensors. For instance, different levels of error may be associated with a motion sensor at different temperature levels. In one implementation, the sensor measurement data associated with the various orientations at a temperature is used in determining the calibration data for that temperature. | 05-16-2013 |
Gaurav Ahuja, Glendale, CA US
Patent application number | Description | Published |
---|---|---|
20130318097 | SYSTEM AND METHOD FOR TRACKING EVENTS - A system and method for keeping track of events. In the preferred embodiment, a counter is created on a mobile device and is set to update one or more values based on the occurrence of a triggering event. The triggering event may be based on the user pressing a button or otherwise interacting with the mobile device, or may be based on other functions of the mobile device, such as the arrival in a particular location as determined by GPS. Counters may be shared with other mobile devices, and data in the counters may be stored on the mobile device or in a remote location. Mobile devices can share data from their counters with other mobile devices, and counters can be set to compare data between different mobile devices. Alerts can be set based on predetermined criteria. | 11-28-2013 |
Hitesh Ahuja, Thousand Oaks, CA US
Patent application number | Description | Published |
---|---|---|
20160112292 | METHOD AND SYSTEM FOR NON-TAGGED BASED LATENCY CALCULATION - A system and method for calculating latency including a latency calculation device configured to: receive an enqueue notification relating to a packet enqueue operation and including a queue identifier, increment an enqueue counter, and determine that a latency calculation flag is not set. Based on the determination that the latency calculation flag is not set, the latency calculation device is configured to: determine a first time corresponding to the enqueue notification, store the first time, store a latency start count, and set the latency calculation flag. The latency calculation device is also configured to: receive a dequeue notification relating to the packet dequeue operation and including the queue identifier, increment a dequeue counter, determine that the latency start count and the dequeue counter values match, determine a second time corresponding to the dequeue notification, and calculate latency as the difference between the first time and the second time. | 04-21-2016 |
Neeraj Ahuja, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20080270659 | Governing access to a computing resource - Technologies are described herein for governing access to a computing resource. A proxy receives a request to access a computing resource. In response to the request, the proxy determines whether the request can be granted without consulting a governor for the computing resource. If the request cannot be granted without consulting the governor, the proxy transmits the request to a broker. The broker, in turn, transmits the request to a governor for the computing resource. The governor determines whether the requested access to the computing resource should be granted. The governor generates a response to the request and transmits the response to the broker. The broker, in turn, transmits the response to the proxy. The broker may also request notifications from the governor. | 10-30-2008 |
20100070480 | SYNCHRONIZING FIELD VALUES IN AN ON-DEMAND DATABASE PRIOR TO COMMITTING A CHANGE - Methods and systems are provided for synchronizing field values in transient data objects, such as JAVA® objects, before saving a transaction to a database. A dependency from one data object to another data object is detected, and changes which affect the second data object's fields through the dependency are flowed through to the second data object. This is performed between each step of a multistep save process, such between triggers, validation rules, workflows, and the final committing of data to the database. | 03-18-2010 |
20100223100 | Methods and Systems for Sales Networking - Methods and systems for sales networking are provided. A user of a database system can be helped to identify relevant business opportunities from those similar to a selected opportunity. For example, a salesperson can search for similar deals to the one the person is working, contact people who have worked similar deals and ask for their advice, and bookmark those deals to refer back to them as they work the deal. The similar opportunities can be found by matching properties (such as field and related records) of an opportunity record that corresponds to the opportunity of interest. | 09-02-2010 |
20110289047 | PERFORMING AN UPGRADE IN A MULTI-TENANT DATABASE SYSTEM ENVIRONMENT - A system and method for providing features in a database system. In one embodiment, a method includes receiving, from a user, a request for a feature, where the feature is a functionality of the database system. The method further includes upgrading the database system, where the upgrading includes one or more provisioning steps that are based on the request from the user. | 11-24-2011 |
20110295910 | CUSTOMIZING STANDARD FORMULA FIELDS IN A MULTI-TENANT DATABASE SYSTEM ENVIRONMENT - In a method, system, and computer-readable medium having instructions for customizing standard formula fields, at least a portion of a formula is received for a standard database field of a standard database entity in a multi-tenant database and the standard database entity is used by a plurality of tenants, a date range is stored for maintaining at least the portion of the formula, information on one or more variables of the formula is received, a value is calculated for the standard database field with at least the portion of the formula and information on the one or more variables of the formula and one or more database entities depend on the value for the standard database field, and the value is stored for the standard database field. | 12-01-2011 |
20110296298 | PROVIDING A QUOTE TEMPLATE IN A MULTI-TENANT DATABASE SYSTEM ENVIRONMENT - In a method, system, and computer-readable medium having instructions for providing a quote template in a multi-tenant database system, information on a selection of a first database object is received for use in creation of a document template, representations for one or more database fields related to the first database object are displayed on a user interface and a database field related to the first database object has a database field of the first database object or a second database object related to the first database object and a representation of the database field may be selected on a layout for one or more documents that can be created with the document template, information is received on the layout of a document to be created with the document template and the layout of the document template has one or more selected database fields related to the first database object, and rendering information is generated for the document with information on the layout in the document template in a target format. | 12-01-2011 |
Nilesh Ahuja, Santa Clara, CA US
Nitin Ahuja, Dublin, CA US
Patent application number | Description | Published |
---|---|---|
20160050187 | METHODS AND APPARATUSES TO TRACK INFORMATION USING CALL SIGNALING MESSAGES - Methods and systems to facilitate real time communications via a telephonic apparatuses that support data communications. In one embodiment, a telephonic apparatus includes: a network interface to submit a query over a data communication network and to receive a listing with embedded information about the query; and a call module coupled to the network interface, the call module to embed the information about the query in a call signaling message for a telephonic connection according to the listing. | 02-18-2016 |
Nitin Ahuja, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20090067599 | Methods and Apparatuses for Pay-Per-Call Advertising in Mobile/Wireless Applications - Methods and apparatuses to connect telephone calls and track information about the telephone calls resulting from advertisements on mobile/wireless media channels. In one embodiment, a method includes: assigning a telephone number to an advertiser, one of the telephone number and a reference to the telephone number to be included in an advertisement provided to an end user via a wireless media; and, monitoring telephone connections to the telephone number to bill the advertiser for the advertisement in response to each telephone connection to the telephone number. In one embodiment, a method includes: a first party providing an advertisement to a mobile device on behalf of an advertiser, the advertisement to include at least a reference to a telephonic connection with the advertiser; and, the first party collecting a fee from the advertiser in response to a telephonic connection being established between the advertiser and customer. | 03-12-2009 |
20130018712 | METHOD AND APPARATUS TO ALLOCATE AND RECYCLE TELEPHONE NUMBERS IN A CALL-TRACKING SYSTEM - In one embodiment, the invention provides a method. The method includes dynamically allocating a telephone number to an advertisement on a just-in-time basis; and if the telephone number is not called for a predefined period of time, then unallocating the telephone number. | 01-17-2013 |
20130336471 | METHODS AND APPARATUSES FOR DELIVERY OF ADVICE TO MOBILE/WIRELESS DEVICES - Methods and apparatuses to connect consumers to diverse advice sources of experts. In one embodiment, a method includes: providing a list of experts to a mobile device via a wireless media channel for presentation to a consumer; responsive to receiving from the mobile device a selection of one expert from the list of experts, initiating a telephonic connection between the expert and the consumer prior to the consumer submitting a question for advice. In one example, the list includes information to indicate whether one or more of the experts are individually available to telephonically communicate with the consumer at a time when the list is provided to the consumer. In one example, initiating the telephonic connection includes: initiating a first call to the consumer; initiating a second call to the expert; and joining the first and second calls to make the telephonic connection between the expert and the consumer. | 12-19-2013 |
20140207588 | METHOD AND APPARATUS TO ALLOCATE AND RECYCLE TELEPHONE NUMBERS IN A CALL-TRACKING SYSTEM - A method including: dynamically allocating a telephone number to an advertisement on a just-in-time basis; and if the telephone number is not called for a predefined period of time, unallocating the telephone number. | 07-24-2014 |
Pratima Ahuja, Foster City, CA US
Patent application number | Description | Published |
---|---|---|
20080285752 | APPARATUS AND SYSTEM FOR ASYMMETRIC SECURITY - An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node. | 11-20-2008 |
Rajat Ahuja, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20080263026 | Techniques for detecting duplicate web pages - Techniques are disclosed for detecting web pages with duplicate content. In one embodiment, a set of shingles is computed for each page of a group of pages. An aggregate set of shingles is determined based on the sets of shingles computed for the group of pages. A first subset from the aggregate set of shingles is determined by selecting, from the aggregate set, shingles whose frequencies in the aggregate set exceed a specified threshold. A modified set of shingles is generated for each page of the group of pages by removing, from the set of shingles for that page, any shingle included in the first subset. One or more duplicate pages in the group of pages are determined based at least in part on the modified sets of shingles generated for the group of pages. | 10-23-2008 |
20090125516 | SYSTEM AND METHOD FOR DETECTING DUPLICATE CONTENT ITEMS - Generally, the present invention provides systems, methods and computer program products for detecting different content items with similar content by examining the anchortext of the link. A method of the present invention comprises selecting one of a plurality of websites, crawling the selected website to identify one or more content items, and downloading one or more content items of the selected website. A determination is then made as to the one or more linking relationships from the one or more content items of the selected website and one or more linking rules are learned based upon association rule mining of the one or more content items. The one or more linking rules are then applied to one or more content items of one or more websites in order to determine storage of the one or more content items based upon the one or more linking rules on a search provider's central server. | 05-14-2009 |
20090164502 | SYSTEMS AND METHODS OF UNIVERSAL RESOURCE LOCATOR NORMALIZATION - Disclosed herein are method, systems and architectures for normalizing identifiers corresponding to resources using normalization rules that can be generalized for use with different resources. By way of a non-limiting example, an identifier can be a uniform resource locator (URL), and a normalization rule can be used to normalize URLs that correspond to different resources, e.g., content. A normalization rule can be generated by generalizing two or more normalization rules corresponding to different resources, such that a content determinative component is generalized. A normalization rule can be defined to include a context portion used to determine the rule's applicability to an identifier, and a transformation portion that identifies the transformations to be applied to an applicable identifier to yield a normalized form of the URL. A generalization of two or more normalization rules can include a normalization of one or both of the context and transformation portions. | 06-25-2009 |
20100325129 | DETERMINING THE GEOGRAPHIC SCOPE OF WEB RESOURCES USING USER CLICK DATA - A geographic region is automatically determined for an Internet resource based on information that has been gathered over time through the automatic monitoring of certain “click” activities of Internet search engine-using users. Over time, the search engine collects information for each click. Using this click-related data, the search engine estimates the geographic region with which the resource ought to be associated. The fact that a significant proportion of clicks on a resource's hyperlink are clicks that “came through” a search engine portal that is associated with a geographic region tends to suggest that the resource ought to be associated with that geographic region. Similarly, the fact that a significant proportion of clicks on a resource's hyperlink are clicks that were made by users whose computers have IP addresses that are associated with a geographic region tends to suggest that the resource ought to be associated with that geographic region. | 12-23-2010 |
Rajat Ahuja, Union City, CA US
Patent application number | Description | Published |
---|---|---|
20130151512 | Location Input Mistake Correction - A system for automatically correcting a mistaken geocoded location input. A wireless device such as a cell phone ranks possible location input based on edit distance, which is a ‘confidence factor’. If there is no perfect match, then a list of geocode options is returned, preferably sorted by the score. The ‘closeness’ is derived by looking at the edit distance to go from the input to the matched address. Edit distance is defined herein as the number of insertion/deletion/replacement operations to go from input location to the possible matched location. In one embodiment, an option list, or ‘pick list’, may be provided based on an edit distance scoring system. The edit distance scoring system is preferably based on a number of keystrokes difference between the input location name and the possible matched location name. | 06-13-2013 |
Ratinder Ahuja, Saratoga, CA US
Patent application number | Description | Published |
---|---|---|
20130254838 | SYSTEM AND METHOD FOR DATA MINING AND SECURITY POLICY MANAGEMENT - A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data discovered through a capture system. The method further includes generating an Online Analytical Processing (OLAP) element to represent information received from the query. A rule based on the OLAP element is generated and the rule affects data management for one or more documents that satisfy the rule. In more specific embodiments, the method further includes generating a capture rule that defines items the capture system should capture. The method also includes generating a discovery rule that defines objects the capture system should register. In still other embodiments, the method includes developing a policy based on the rule, where the policy identifies how one or more documents are permitted to traverse a network. | 09-26-2013 |
20150106875 | SYSTEM AND METHOD FOR DATA MINING AND SECURITY POLICY MANAGEMENT - A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data discovered through a capture system. The method further includes generating an Online Analytical Processing (OLAP) element to represent information received from the query. A rule based on the OLAP element is generated and the rule affects data management for one or more documents that satisfy the rule. In more specific embodiments, the method further includes generating a capture rule that defines items the capture system should capture. The method also includes generating a discovery rule that defines objects the capture system should register. In still other embodiments, the method includes developing a policy based on the rule, where the policy identifies how one or more documents are permitted to traverse a network. | 04-16-2015 |
Ratinder Paul Singh Ahuja, Saratoga, CA US
Patent application number | Description | Published |
---|---|---|
20100121853 | QUERY GENERATION FOR A CAPTURE SYSTEM - A document accessible over a network can be registered. A registered document, and the content contained therein, is not transmitted undetected over and off of the network. In one embodiment, the invention includes a manager agent to maintain signatures of registered documents and a match agent to detect the unauthorized transmission of the content of registered documents. | 05-13-2010 |
20110167265 | CRYPTOGRAPHIC POLICY ENFORCEMENT - Objects can be extracted from data flows captured by a capture device. In one embodiment, the invention includes assigning to each captured object a cryptographic status based on whether the captured object is encrypted. In one embodiment, the invention further includes determining whether the object violated a cryptographic policy using the assigned cryptographic status of the object. | 07-07-2011 |
20110196911 | TAG DATA STRUCTURE FOR MAINTAINING RELATIONAL DATA OVER CAPTURED OBJECTS - Objects captured over a network by a capture system can be indexed to provide enhanced search and content analysis capabilities. In one embodiment the objects can be indexed using a data structure having a source address field to indicate an origination address of the object, a destination address field to indicate a destination address of the object, a source port field to indicate an origination port of the object, a destination port field to indicate a destination port of the object, a content field to indicate a content type from a plurality of content types identifying a type of content contained in the object, and a time field to indicate when the object was captured. The data structure may also store a cryptographic signature of the object to ensure the object is not altered after capture. | 08-11-2011 |
20110197284 | ATTRIBUTES OF CAPTURED OBJECTS IN A CAPTURE SYSTEM - A system and method for capturing objects and balancing systems resources in a capture system are described. An object is captured, metadata associated with the objected generated, and the object and metadata stored. | 08-11-2011 |
20110219237 | DOCUMENT REGISTRATION - A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures, each signature being associated with one of a plurality of registered documents, intercepting an object being transmitted over a network, calculating a set of signatures associated with the intercepted object, and comparing the set of signatures with the plurality of stored signatures. In one embodiment, the invention can further include detecting registered content from the registered document being contained in the intercepted object, if the comparison results in a match of at least one of the signatures in the set of signatures with one or more of the plurality of stored signatures. | 09-08-2011 |
20110258197 | METHOD AND APPARATUS FOR DATA CAPTURE AND ANALYSIS SYSTEM - Content leaving a local network can be captured and indexed so that queries can be performed on the captured data. In one embodiment, the present invention comprises an apparatus that connects to a network. In one embodiment, this apparatus includes a network interface module to connect the apparatus to a network, a packet capture module to intercept packets being transmitted on the network, an object assembly module to reconstruct objects being transmitted on the network from the intercepted packets, an object classification module to determine the content in the reconstructed objects, and an object store module to store the objects. This apparatus can also have a user interface to enable a user to search objects stored in the object store module. | 10-20-2011 |
20110276575 | Query Generation for a Capture System - A document accessible over a network can be registered. A registered document, and the content contained therein, is not transmitted undetected over and off of the network. In one embodiment, the invention includes a manager agent to maintain signatures of registered documents and a match agent to detect the unauthorized transmission of the content of registered documents. | 11-10-2011 |
20110276709 | Locational Tagging in a Capture System - A system and method for locational tagging in a capture system are described. Metadata associated with a captured object includes: information about a location in storage of an object and that objects association to a particular user; and/or tiered location information. | 11-10-2011 |
20120114119 | SYSTEM AND METHOD FOR PROTECTING SPECIFIED DATA COMBINATIONS - A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter. | 05-10-2012 |
20130246334 | SYSTEM AND METHOD FOR PROVIDING DATA PROTECTION WORKFLOWS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes receiving first sets of metadata elements representing objects of an inventory and generating a first summary of a first subset of the objects. The method further includes receiving second sets of metadata elements and corresponding category information representing objects of the first subset that are classified based on a first category and generating a second summary of a second subset of the classified objects. In yet further embodiments, the method includes initiating a protection task for objects of the second subset of the classified objects. In more specific embodiments, the protection task includes applying a remediation policy to the objects of the second subset or registering the objects of the second subset. In yet other embodiments, the second summary includes at least one of a total count and a total size of the objects in the second subset. | 09-19-2013 |
20130246335 | SYSTEM AND METHOD FOR PROVIDING DATA PROTECTION WORKFLOWS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset. | 09-19-2013 |
20130246336 | SYSTEM AND METHOD FOR PROVIDING DATA PROTECTION WORKFLOWS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes crawling a storage location of a network environment to identify objects, fetching the identified objects, creating indexes corresponding to the identified objects, and classifying one or more objects of the identified objects based on a first category. The method further includes providing first sets of metadata elements and corresponding first category information representing the classified one or more objects of the identified objects, searching the indexes for a selected group of the classified one or more objects of the identified objects, and classifying one or more objects of the selected group based on a second category. In more specific embodiments, the method includes applying a remediation policy to the classified one or more objects of the selected group. In other more specific embodiments, the method includes registering the classified one or more objects of the selected group. | 09-19-2013 |
20130246337 | System and Method for Intelligent Term Grouping - A method is provided in one example embodiment and it includes identifying a root word for a tree to be used in managing data and creating a word stem to be included in the tree. A query is initiated to determine whether a stem node exists at one or more branch points of the word, and if the stem node does not exist, then the stem node is added to a branch point of the tree. In more specific embodiments, if the stem node does exist, then node statistics are updated. In other embodiments, the method includes updating a branch point list after creating the word stem. In yet other embodiments, the branch point is a word or a combination of words. The tree can be used to identify locations and frequencies within a document set where one or more words are present. | 09-19-2013 |
20130246371 | System and Method for Concept Building - A method is provided in one example embodiment and it includes identifying a root term and determining one or more other terms belonging to a group associated with the root term. The method also includes selecting one or more of the terms from the group and generating a concept based on the selected terms from the group, wherein the concept is applied to a rule that affects data management for one or more documents that satisfy the rule. In more specific embodiments, the root term is identified via a search or via an incident list. In other embodiments, a collection of meaningful terms is provided to assist in determining the other terms for the group, the collection of meaningful terms being generated based on the root term. The concept can be used to automatically mark one or more documents that relate to the concept. | 09-19-2013 |
20130246424 | SYSTEM AND METHOD FOR INTELLIGENT STATE MANAGEMENT - A method is provided in one example embodiment and it includes receiving a state request and determining whether a state exists in a translation dictionary for the state request. The method further includes reproducing the state if it is not in the dictionary and adding a new state to the dictionary. In more specific embodiments, the method includes compiling a rule, based on the state, into a given state table. The rule affects data management for one or more documents that satisfy the rule. In yet other embodiments, the method includes determining that the state represents a final state such that a descriptor is added to the state. In one example, if the state is not referenced in the algorithm, then the state is released. If the state is referenced in the algorithm, then the state is replaced with the new state. | 09-19-2013 |
20130246431 | SYSTEM AND METHOD FOR PROVIDING DATA PROTECTION WORKFLOWS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes receiving sets of metadata elements and corresponding category information representing objects of a data storage location that are classified based on a category. The method further includes generating a summary of a subset of the classified objects and initiating a protection task for objects of the subset. In more specific embodiments, the protection task includes applying a remediation policy to the objects of the subset. Another protection task includes registering the objects of the subset. In other specific embodiments, the summary includes at least one of a total count and a total size of the objects in the subset. In yet other more specific embodiments, the method includes creating an Online Analytical Processing (OLAP) data structure to represent the sets of metadata elements and the corresponding category information with the summary of the subset being generated from the OLAP data. | 09-19-2013 |
20130246925 | SYSTEM AND METHOD FOR MANAGING DATA AND POLICIES - In one embodiment, a method is provided and includes capturing a plurality of packet streams, recreating a plurality of flows from the packet streams, and analyzing the flows to identify one or more incidents. The incidents indentify one or more pieces of data. The incidents are filtered and the incidents are rendered on a display for an end user that initiated the filtering operation. In other embodiments, the display allows the end user to view a selected one of a group of attributes for the incidents. The display allows the end user to open a captured object associated with a specific incident. In still other embodiments, the display allows a user to filter the incidents using a selected one of a group of group options such as content, destination IP, destination location, destination port, filename, host IP, etc. | 09-19-2013 |
20140032919 | DOCUMENT DE-REGISTRATION - A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures in a signature database, each signature being associated with one of a plurality of registered documents. In one embodiment, the invention further includes maintaining the signature database by de-registering documents by removing the signatures associated with de-registered documents. In one embodiment, the invention further includes maintaining the database by removing redundant and high detection rate signatures. In one embodiment, the invention also includes maintaining the signature database by removing signatures based on the source text used to generate the signature. | 01-30-2014 |
20140164314 | SYSTEM AND METHOD FOR PROVIDING DATA PROTECTION WORKFLOWS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset. | 06-12-2014 |
20140173739 | AUTOMATED ASSET CRITICALITY ASSESSMENT - A set of attributes of a particular asset of a computing environment is identified that are determined from data collected by one or more utilities in the computing environment. A criticality rating is automatically determined for the particular asset based at least in part on the set of attributes. A security activity is caused to be performed relating to the particular asset based on the automatically determined criticality rating of the particular asset. | 06-19-2014 |
20140194094 | DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES - System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy. | 07-10-2014 |
20140289416 | ATTRIBUTES OF CAPTURED OBJECTS IN A CAPTURE SYSTEM - A system and method for capturing objects and balancing systems resources in a capture system are described. An object is captured, metadata associated with the objected generated, and the object and metadata stored. | 09-25-2014 |
20150067810 | SYSTEM AND METHOD FOR PROTECTING SPECIFIED DATA COMBINATIONS - A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter. | 03-05-2015 |
20160142442 | System and Method for Intelligent State Management - A method is provided in one example embodiment and it includes receiving a state request and determining whether a state exists in a translation dictionary for the state request. The method further includes reproducing the state if it is not in the dictionary and adding a new state to the dictionary. In more specific embodiments, the method includes compiling a rule, based on the state, into a given state table. The rule affects data management for one or more documents that satisfy the rule. In yet other embodiments, the method includes determining that the state represents a final state such that a descriptor is added to the state. In one example, if the state is not referenced in the algorithm, then the state is released. If the state is referenced in the algorithm, then the state is replaced with the new state. | 05-19-2016 |
Ritesh Ahuja, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20160098670 | Technological and Financial Partnerships to Enable a Package Exchange Service - A cloud based package transfer system is discussed that has a cloud based package-exchange-service hosted on a cloud based provider site. The cloud based package-exchange-service supplies servers and databases of retail websites with information regarding services for package exchange available to customers and their associated vehicles. The information enables a retail website to present a checkbox, the presented checkbox enables a customer at a checkout point of the purchase from the retail website to select an alternative package delivery option of delivering the purchased products to a target vehicle of the customer. The package-exchange-service receives purchase information from the retail websites and use purchase information to create database records for completed delivery operations. The package-exchange-service sets up the package delivery operation and implements a financial model that use the database records to calculate financial transactions between the package-exchange-service and the retail websites. | 04-07-2016 |
20160098870 | METHOD AND SYSTEM FOR REMOTE ACCESS CONTROL - A method to learn and then pair with a pre-installed access control system of a vehicle is discussed. Communication is exchanged between the access control system and a backend cloud-based system. Required data of the access control system including its particular authentication code is extracted by a learning device. A vehicle matching data is sent to the backend cloud-based system and the vehicle is registered with the backend cloud-based system. The learning device is registered to the access control system in accordance with learning procedures implemented in the vehicle as remote entry key. The learning device is coupled to a Radio Frequency signal transmitter that has Application-Specific Integrated Circuits to generate stable RF signals at multiple frequency wavelengths. Registration of learning device includes, receiving a first access control telegram message, transmitting the first access control telegram message to the access control system, pairing the learning device with the access control system. | 04-07-2016 |
Ritesh Ahuja, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20160098871 | Package Exchange and Service System Using a Key Fob Simulator - A key fob simulator for sending actuation command to a vehicle is discussed. The key fob has memory buffers, processors, and a transceiver that uses wireless communications to communicate with a backend cloud-based system. A RF transmitter of the key fob can transmit RF signals to Remote Keyless Entry (RKE) module of the vehicle. A mapping module includes a map-calculating circuit to calculate map coordinates of the key fob. A security module can receive a rolling security key of the RKE module of the vehicle. The key fob includes buttons that can be pushed by a user of the key fob to generate actuation commands by the security module. Using the RF transmitter, an actuation command and the rolling security key can be sent from security module to the RKE module of the vehicle. The RKE module then executes the actuation command after validating the rolling security key. | 04-07-2016 |
Sandeep Ahuja, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20090279255 | PIEZO FANS FOR COOLING AN ELECTRONIC DEVICE - A cooling system including one or more piezo fans for an electronic assembly is disclosed. The electronic assembly may include heat-generating components coupled with a front side of a printed circuit board (PCB) and one or more piezo fans coupled with a back side of the PCB. One or more piezo fans may be capable of cooling the heat-generating components from the back side. The cooling system may further include a heat sink coupled with the back side of the PCB. | 11-12-2009 |
Satyajeet Ahuja, Us, CA US
Patent application number | Description | Published |
---|---|---|
20140355424 | Contention Handling in SMP Based Networks - Nodes and methods are disclosed for protection and restoration in the event of multiple failures for multiple paths involved for the same service in shared mesh networks, including, a method comprising the steps of storing, in non-transitory memory of a first node in a shared mesh network having a plurality of connections through the shared mesh network, records of global contention handling priority values of the plurality of connections; detecting a first signal from a second node requesting activation of a first connection of the plurality of connections, and a second signal from a third node requesting activation of a second connection of the plurality of connections, the first and second connections having overlapping requirements; determining that the second connection has a higher global contention handling priority value than the first connection based at least in part on the records; and activating the second connection. | 12-04-2014 |
Satyajeet Ahuja, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20140199067 | METHOD TO RE-PROVISION BANDWIDTH IN P-OTN NETWORK BASED ON CURRENT TRAFFIC DEMAND - A method, comprises measuring, by circuitry of a computer system, a first bandwidth of data traffic of a transport path over a time period, the transport path passing through a plurality of nodes and conforming to a protocol using a number of time slots to allocate a second bandwidth to the transport path. The method further includes passing a signal, from the computer system to at least one of the nodes of the transport path, the signal including at least one instruction that when executed by circuitry of the at least one node causes a change to the number of time slots allocated to the transport path. | 07-17-2014 |
Satyajeet S. Ahuja, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20130294228 | Optimal Segment Identification for Shared Mesh Protection - Nodes and methods are disclosed, including, circuitry of a source node in a mesh network retrieving information indicative of network topology; identifying a working path from the source node to a destination node; identifying potential protection segments of the working path, wherein a potential protection segment has at least one disjoint protection path available for the segment; creating a hypothetical network topology comprising the nodes of the working path and hypothetical links between the nodes, wherein the hypothetical links represents potential protection segments identified, and the links are assigned a weight; executing a Shortest Path Algorithm on the hypothetical network topology; identifying as optimal segments the potential protection segments represented by the hypothetical links determined as being in the shortest path by the Shortest Path Algorithm; generating and transmitting a message communicating need for resources in case of failure of the optimal segments. | 11-07-2013 |
Satyajeet Singh Ahuja, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20140147106 | RAPID RECOVERY IN PACKET AND OPTICAL NETWORKS - A node may determine a failure in a first path for routing first optical network traffic between a first set of networking devices, where the first path includes a first set of optical transport nodes. The node may determine a second path for routing the first optical network traffic between the first set of networking devices, where the second path includes a second set of optical transport nodes that route second optical network traffic between a second set of networking devices. The second set of optical transport nodes may include at least one node that is not included in the first set of optical transport nodes. The node may pre-empt routing of the second optical network traffic via the second path, and may route the first optical network traffic via the second path after pre-empting routing of the second optical network traffic via the second path. | 05-29-2014 |
20140169788 | QUALITY OF SERVICE APPLICATION FOR DIFFERENT DATA FLOW TYPES - A network device is configured to store parameters identifying a respective quality of service (QoS) to apply to corresponding different types of data flows; initiate establishment of a network channel between a source device and a destination device through an optical network; receive first and second data flows destined for the destination device, where the first data flow and the second data flow may have first and second data flow types; identify a first QoS and a different second QoS to apply to the first and second data flows based on the first and second data flow types and based on the parameters; apply the first QoS to the first data flow and the second QoS to the second data flow to form processed first and second data flows; and transmit, via the network channel, the processed first and second data flows towards the destination device. | 06-19-2014 |
Sourabh Ahuja, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20150141136 | SYSTEMS AND METHODS FOR PROVIDING AN INTERACTIVE HANDS-FREE VIDEO GAME TUTORIAL - Systems and methods for providing a tutorial for a video game are provided. The tutorial is characterized by a hierarchical data structure having a plurality of nodes connected by edges. Each node represents a video game stage and provides oral instructions on how to progress to another node. An edge represents head movements necessary to move to another node. At a computing device a current node is identified and the oral instructions associated with the node are provided. User head movements are sensed by a movement measuring component of the computing device and the current node and sensed user head movements are compared to edges associated with the current node. When a match is found, advancement to the node identified by the matching edge occurs. However, advancement is forgone when the user head movements do not match the head movements of any of the edges associated with the current node. | 05-21-2015 |
20150143221 | SYSTEMS AND METHODS FOR PROVIDING FUSED IMAGES TO REMOTE RECIPIENTS FOR DESCRAMBLING AND INTERPRETATION - Disclosed are systems and methods for using a hands free computing device. The device includes a processor, a head movement measuring component, screen, camera, microphone, and memory. Responsive to sensing an instruction by a user, an image is captured by the camera and displayed on the screen. There is recorded, using the microphone, an audible catch phrase provided by the user for the image. The audible catch phrase is converted to text that is superimposed on the image thereby making a fused image. The user identifies one or more remote recipients of the fused image by making one or more predetermined head movements to select from among recipient candidates. The fused image is communicated, with the text phrase formatted for scrambled display, to the one or more remote recipients. The fused image is displayed on remote devices associated with such recipients with the text phrase scrambled. | 05-21-2015 |
20160094495 | METHODS AND SYSTEMS FOR OBSCURING TEXT IN A CONVERSATION - A method at a first electronic device with a display and an input device includes: receiving a message from a second electronic device, the message comprising a first text and a text effect applied to the message; displaying a first representation of the message in accordance with the text effect; receiving a user input with respect to the first representation; and in response to the user input with respect to the first representation, displaying a second representation of the message in accordance with the text effect. | 03-31-2016 |
20160110906 | METHODS AND SYSTEMS FOR IMAGES WITH INTERACTIVE FILTERS - At a first device there is received from a second device (i) a native pixilated image and (ii) interactive filter data associated with the image. The filter data corresponds to an interactive filter applied to the image. A first representation of the image is displayed in accordance with the interactive filter data on the display. All or a first subset of the pixels of the image are obscured in the first representation. Responsive to user input, for a period of time specified by the filter, a second representation of the image is displayed in place of the first representation. None or a second subset of the pixels of the image is obscured in the second representation, where the second subset is less than the first subset. Then there is displayed on the display, after the limited period of time has elapsed, the first representation in place of the second representation. | 04-21-2016 |
Umesh Ahuja, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20120100177 | SALMONELLA ENTERICA PRESENTING C. JEJUNI N-GLYCAN OR DERIVATIVES THEREOF - The present invention relates to | 04-26-2012 |
20140323700 | RECOMBINANT N-GLYCOSYLATED PROTEINS FROM PROCARYOTIC CELLS - The present invention relates to recombinant N-glycosylated proteins, comprising one or more introduced N-glycosylated optimized amino acid sequence(s), nucleic acids encoding these proteins as well as corresponding vectors and host cells. In addition, the present invention is directed to the use of said proteins, nucleic acids, vectors and host cells for preparing medicaments. Furthermore, the present invention provides methods for producing said proteins. | 10-30-2014 |