Bellur
Barghav R. Bellur, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20120002536 | INTERFERENCE MITIGATION AND ADAPTIVE ROUTING IN WIRELESS AD-HOC PACKET-SWITCHED NETWORKS - Described are an apparatus and method for routing packets through a multiple-hop wireless communications network. Interference with packet switched communications carried by radio frequency (RF) over the multiple-hop wireless communications network is detected. In response to information related to the detected interference, a route is adaptively determined for transmitting packets through the multiple-hop wireless communications network that mitigates the effect of the interference on the packets. | 01-05-2012 |
Bhargav R. Bellur, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110238997 | EFFICIENT TECHNIQUE TO ACHIEVE NON-REPUDIATION AND RESILIENCE TO DoS ATTACKS IN WIRELESS NETWORKS - A computationally efficient message verification strategy that achieves non-repudiation and resilience to computational denial of service attacks in conjunction with a broadcast authentication protocol that authenticates messages using a combination of a digital signature and a TESLA MAC. When messages are received at a receiver, the verification strategy separates the messages into messages with the same sender identification. The strategy then determines whether the TESLA MAC authenticator is valid for each message and discards those messages that do not have a valid TESLA MAC. The strategy collects the messages that have a valid TESLA MAC for each sender identification and performs a batch verification process on the group of messages to determine if the messages in the group have a valid digital signature. This strategy verifies each message in the group of messages if the batch verification process shows that the group of messages has a valid digital signature. | 09-29-2011 |
20110258435 | Threat Mitigation in a Vehicle-to-Vehicle Communication Network - A method is provided for obtaining a certificate revocation list (CRL) for a vehicle in a vehicle-to-vehicle communication system. A portable security unit is provided to access secured operations for the vehicle. The portable security unit is linked to a device having access to a communication network. The communication network is in communication with a certificate authority for issuing an updated CRL. The updated CRL is downloaded from the certificate authority to the portable security unit. At a later time, when a user enters the vehicle, a communication link is established between the portable security unit and a vehicle processor unit. Mutual authentication is exchanged between the portable security unit and the vehicle processing unit. The updated CRL stored in the portable security unit is downloaded to a memory of the vehicle communication system in response to a successful mutual authentication. | 10-20-2011 |
20110304425 | Systems and Methods for Efficient Authentication - A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message. | 12-15-2011 |
20140002276 | FRAMEWORK FOR PACKET PROCESSING FOR SECURE V2V APPLICATIONS ON RESOURCE-CONSTRAINED PLATFORMS | 01-02-2014 |
20140006615 | METHOD FOR EFFICIENT MESSAGE VERIFICATION ON RESOURCE-CONSTRAINED PLATFORMS FOR REAL-TIME TRACKING APPLICATIONS | 01-02-2014 |
20140037092 | METHOD AND SYSTEM OF RECONSTRUCTING A SECRET CODE IN A VEHICLE FOR PERFORMING SECURE OPERATIONS - A method is provided for constructing a secret code in a processing unit when in communication with a portable security unit. Mutual authentication messages are exchanged between a linked portable security unit and processing unit. A first portion of the secret code is communicated to the processing unit. The processing unit combines the first portion and a second portion of the secret code stored in the non-volatile memory of the processing unit. The secret code is stored in a volatile memory of the processing unit. A secure operation is performed using the secret code. The portable security unit is de-linked from the processing unit. At least a portion of the secret code is deleted from the volatile memory of the processing unit. | 02-06-2014 |
Bhargav Ramachandra Bellur, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110075566 | Effective Bandwidth Path Metric and Path Computation Method for Wireless Mesh Networks with Wired Links - Enhanced mesh network performance is provided by computation of a path metric with respect to multi-hop paths between nodes in a mesh network and determination of a path through the mesh network that is optimal according to the path metric. Information is communicated in the mesh network according to the determined path. Nodes in the mesh network are enabled to communicate via one or more wireless links and/or one or more wired links. The path metric optionally includes an effective bandwidth path metric having elements (listed from highest to lowest conceptual priority) including an inverse of a sustainable data rate, a number of wireless links, and a number of wireless and wired links. The sustainable data rate is a measure of communication bandwidth that is deliverable by a path for a period of time. Accounting is made for interference between contiguous wireless links operating on the same channel. | 03-31-2011 |
20140185454 | Effective Bandwidth Path Metric and Path Computation Method for Wireless Mesh Networks with Wired Links - Enhanced mesh network performance is provided by computation of a path metric with respect to multi-hop paths between nodes in a mesh network and determination of a path through the mesh network that is optimal according to the path metric. Information is communicated in the mesh network according to the determined path. Nodes in the mesh network are enabled to communicate via one or more wireless links and/or one or more wired links. The path metric optionally includes an effective bandwidth path metric having elements (listed from highest to lowest conceptual priority) including an inverse of a sustainable data rate, a number of wireless links, and a number of wireless and wired links. The sustainable data rate is a measure of communication bandwidth that is deliverable by a path for a period of time. Accounting is made for interference between contiguous wireless links operating on the same channel. | 07-03-2014 |
Bhargav Ramchandra Bellur, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090235071 | CERTIFICATE ASSIGNMENT STRATEGIES FOR EFFICIENT OPERATION OF THE PKI-BASED SECURITY ARCHITECTURE IN A VEHICULAR NETWORK - A system and method for assigning certificates and reducing the size of the certificate revocation lists in a PKI based architecture for a vehicle wireless communications system that includes separating a country, or other area, into geographic regions and assigning region-specific certificates to the vehicles. Therefore, a vehicle need only process certificates and certificate revocation lists for the particular region that it is traveling in. Vehicles can be assigned multiple certificates corresponding to more than one region in the vehicles vicinity as advance preparation for possible travel or transmission into nearby regions. Further, the expiration time of certificates assigned to vehicles corresponding to a given geographic region can be tailored to be inversely proportional to the distance from a registered home region of the vehicle. A scalable design for a back-end certifying authority with region-based certificates can also be provided. | 09-17-2009 |
20090254754 | LIGHTWEIGHT GEOGRAPHIC TRAJECTORY AUTHENTICATION VIA ONE-TIME SIGNATURES - A system and method for a vehicle-to-vehicle communications system that provide active safety applications employing lightweight geographic authentication using one-time signatures. The system and method require each vehicle to construct a discretized representation of its trajectory, which captures its kinematical history to a tunable degree of accuracy and to a tunable extent in the past. This trajectory information is then signed using a one-time signature. Thus, with every periodic message, the sending vehicle transmits the usual application payload, a signed version of the trajectory as described, and the digital signature over all of the fields. | 10-08-2009 |
20100201543 | TRUST-BASED METHODOLOGY FOR SECURING VEHICLE-TO-VEHICLE COMMUNICATIONS - A vehicle-to-vehicle communications system that employs a challenge/response based process to ensure that information received from a vehicle is reliable. The subject vehicle transmits a challenge question to the suspect vehicle to determine whether the suspect vehicle is a reliable source of information. The process increases a number of tokens in a token bucket for the suspect vehicle if the response to the challenge question is correct, and decreases the number of tokens in the token bucket for the suspect vehicle if the response to the challenge question is incorrect. The subject vehicle accepts a message from the suspect vehicle if the number of tokens in the bucket for the suspect vehicle is greater than a predetermined upper threshold, and discards the message from the suspect vehicle if the number of tokens in the bucket for the suspect vehicle is less than a predetermined lower threshold. | 08-12-2010 |
20110035150 | SIMPLE TECHNIQUE FOR DYNAMIC PATH PLANNING AND COLLISION AVOIDANCE - A system and method for dynamically mapping the position and speed of objects around a vehicle for collision avoidance purposes. The method determines the velocity of the vehicle in at least two orthogonal directions along with the position of the vehicle. From this information, a distance function map of the vehicle is created in a predefined area that includes a distance value at concentric locations from the vehicle. The distance function map is combined with distance function maps from all of the objects in the predefined area to determine whether a potential collision exists between the particular vehicle and any of the other objects. | 02-10-2011 |
Esen Bellur, Adana TR
Patent application number | Description | Published |
---|---|---|
20090311745 | GROUP OF ESTERASES FOR THE ENANTIOSELECTIVE PRODUCTION OF FINE AND SPECIALITY CHEMICALS - The present invention relates to a polynucleotide encoding an enzyme having carboxylesterase [E.C. 3.1.1.1] activity, wherein the coding sequence is selected from the group consisting of (a) a polynucleotide encoding an amino acid sequence as depicted in any one of SEQ ID NOs: 2, 4, 6, 8, 10 and 12; (b) a polynucleotide having or comprising a nucleotide sequence encoding an enzyme, wherein the nucleic acid sequence is as shown in any one of SEQ ID NOs: 1, 3, 5, 7, 9 and 11; (c) a polynucleotide having or comprising a nucleotide sequence encoding a fragment or derivative of an enzyme encoded by a polynucleotide of (a) or (b), wherein in said derivative one or more amino acid residues are conservatively substituted compared to the amino acid sequence of (a); (d) a polynucleotide encoding an enzyme having carboxylesterase activity which polynucleotide is at least 66% identical to a polynucleotide encoding an enzyme as shown in one of SEQ ID NOs: 2, 4, 6, 8, 10 and 12; (e) a polynucleotide having or comprising a nucleotide sequence the complementary strand of which hybridizes to a polynucleotide as defined in any one of (a) to (d); and (f) a polynucleotide having or comprising a nucleotide sequence being degenerate to the nucleotide sequence of the polynucleotide of (d) or (e); or the complementary strand of such a polynucleotide of (a) to (f) or fragments thereof useful as specific probes or primers. The present invention also relates to a host genetically engineered with the polynucleotide of the present invention or the vector of the present invention. The present invention also relates to a process for producing a polypeptide having carboxylesterase [E.C. 3.1.1.1] activity, comprising culturing the host of the present invention and recovering the polypeptide produced by said host. Moreover, The present invention also relates to a process for producing bacteria or eukaryotic cells capable of expressing a polypeptide having carboxylesterase [E.C. 3.1.1.1] activity, the process comprising genetically engineering bacteria or eukaryotic cells with the vector of the present invention. Finally, the present invention relates to (poly)peptides, antibodies, compositions and various methods for the production of optically active compounds. | 12-17-2009 |
Kashyap R. Bellur, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20100289537 | SYSTEMS AND METHODS FOR PRODUCING A PREDETERMINED OUTPUT IN A SEQUENTIAL CIRCUIT DURING POWER ON - An integrated circuit configured for producing a predetermined output in a sequential circuit during power on is disclosed. The integrated circuit includes one or more capacitors coupled to one or more internal nodes. The one or more capacitors charge the internal nodes if a voltage at the power supply node ramps up to a set voltage at or faster than a period of time. The integrated circuit also includes a first transistor coupled to the power supply node. The first transistor produces leakage current that charges one or more internal nodes when the voltage on the power supply node ramps up to the set voltage no faster than the period of time. The integrated circuit also includes an output node. A logical value on the output node is based on a logical value on the charged internal nodes when an input signal to the sequential circuit is not active and the voltage on the power supply node is at the set voltage. | 11-18-2010 |
20140035645 | SYSTEM AND METHOD TO PERFORM SCAN TESTING USING A PULSE LATCH WITH A BLOCKING GATE - A system and method to perform scan testing using a pulse latch with a blocking gate is disclosed. In a particular embodiment, a scan latch includes a pulse latch operable to receive data while a pulse clock signal has a first logical clock value and a blocking gate coupled to an output of the pulse latch. The blocking gate is operable to propagate the data from the output of the pulse latch while the pulse clock signal has a second logical clock value. | 02-06-2014 |
Kashyap Ramachandra Bellur, Bangalore Krn IN
Patent application number | Description | Published |
---|---|---|
20160078965 | SCANNABLE MEMORIES WITH ROBUST CLOCKING METHODOLOGY TO PREVENT INADVERTENT READS OR WRITES - An example scannable register file includes a plurality of memory cells and, a shift phase of a scan test shifts data bits from a scan input through the plurality of memory cells to a scan output. The shifting can be performed by, on each clock cycle, reading one of the plurality of memory cells to supply the scan out and writing one of the plurality of memory cells with the data bit on a scan input. To perform sequential reads and writes on each clock cycle, the scannable register can generate a write clock that, during the shift phase, is inverted from the clock used for functional operation. The write clock is generated without glitches so that unintended writes do not occur. Scannable register files can be integrated with scan-based testing (e.g., using automatic test pattern generation) of other modules in an integrated circuit. | 03-17-2016 |
Kashyap Ramachandra Bellur, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20140354338 | LENGTH-OF-DIFFUSION PROTECTED CIRCUIT AND METHOD OF DESIGN - A circuit includes a pulsed-latch circuit. The pulsed-latch circuit includes a first plurality of transistors. One or more of the first plurality of transistors is length-of-diffusion (LOD) protected. | 12-04-2014 |
Negendra Krishnamurthy Bellur, Wilmington, DE US
Patent application number | Description | Published |
---|---|---|
20130218673 | System and Method for Offer Targeting - A system and method for offer targeting is disclosed. According to one embodiment, a method for offer targeting may comprise: providing a plurality of offers and a plurality of groups, wherein each group comprises one or more accounts; maintaining an offer counter for each of the plurality of groups; and assigning the plurality of offers, in a predetermined order, to the plurality of groups by repeating the following steps: (1) assigning an offer to one or more groups, wherein the one or more groups are selected from groups that are pre-qualified for the offer based on a plurality of business rules, and the selection of the one or more groups is based at least in part on the offer counters of the one or more groups; (2) incrementing offer counters associated with the one or more groups; and (3) sorting the plurality of groups based on the incremented offer counters. | 08-22-2013 |
Shashidar Bellur, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110035242 | EVENT DRIVEN AUDIT LOGGING - This disclosure describes, generally, methods and systems for implementing event driven audit logging. The method includes establishing, at an audit logging system, audit logging framework configured to provide application independent connectivity and further configured to provide event driven audit logging. The method further includes receiving, at the audit logging system, a selection of an application to provide event driven auditing, enabling event driven auditing for the selected application, and receiving a selection of event types to enable for auditing by the audit logging framework. Furthermore, the method includes based on the selected event types, tracking the application actions associated with the selected events, creating an event log for the application, and providing access to the event log. | 02-10-2011 |
Srikanth Bellur, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20120211421 | SYSTEMS AND METHODS FOR PROCESSING CO2 - Systems and methods for lowering levels of carbon dioxide and other atmospheric pollutants are provided. Economically viable systems and processes capable of removing vast quantities of carbon dioxide and other atmospheric pollutants from gaseous waste streams and sequestering them in storage-stable forms are also discussed. | 08-23-2012 |
Srikanth Bellur, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20110277670 | SYSTEMS AND METHODS FOR PROCESSING CO2 - Systems and methods for lowering levels of carbon dioxide and other atmospheric pollutants are provided. Economically viable systems and processes capable of removing vast quantities of carbon dioxide and other atmospheric pollutants from gaseous waste streams and sequestering them in storage-stable forms are also discussed. | 11-17-2011 |
Umesh Bellur US
Patent application number | Description | Published |
---|---|---|
20090144695 | Method for ensuring consistency during software development - A method and system for checking consistency of a software system during software system development is disclosed. The software system comprises a source code and a plurality of design diagrams. The source code is represented as a source perspective diagram. A relational meta-model of the software system is prepared based on relationships between the plurality of design diagrams and the source perspective diagram. Thereafter, a plurality of consistency rules are applied on the relational meta-model to verify consistency of the software system. Consistency gaps identified in the software system are reported to a programmer of the software system. | 06-04-2009 |
20090144703 | Method and system for versioning a software system - A versioning system and a versioning scheme verify compatibility between a plurality of entities. The versioning scheme comprises two version numbers—model version number and code version number. Model version number and code version number of each entity is maintained to determine the compatibility between a plurality of entities at the design level and the source code level. A layered structure of a software configuration management tool handles the versioning scheme of the plurality of entities. | 06-04-2009 |
Vijay Bellur, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140059094 | MAKING USE OF A FILE PATH TO DETERMINE FILE LOCALITY FOR APPLICATIONS - A processing device identifies a path name of a file that is stored in a file system and sends an extended attribute request comprising the path name to a server computer system to identify a physical location of the file in the file system. The file system includes a virtual extended attributes that identify the physical location of the file that corresponds to the path name in the request. The processing device receives a response from the server computer system indicating the physical location of the file in the file system | 02-27-2014 |
20140074798 | PRO-ACTIVE SELF-HEALING IN A DISTRIBUTED FILE SYSTEM - A first storage server identifies a second storage server connecting to a cluster of storage servers in a file system. The first storage server locates a file in a replication directory hierarchy in the second storage server. The file has not been accessed by a client application. The first storage server determines, prior to the file being accessed by the client application, that the file on the second storage server has stale data and overwrites the stale data in the file on the second storage server with current data. | 03-13-2014 |
20140074799 | PRO-ACTIVE SELF-HEALING IN A DISTRIBUTED FILE SYSTEM - A first server identifies a second server connecting to a cluster of servers in a file system. The first server examines a file in a replication directory hierarchy in the second server. The file has not been accessed by a client application. The first server determines, prior to the file being accessed by the client application that the file on the second server has stale data and overwrites the stale data in the file on the second server with current data. | 03-13-2014 |