Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Chhabra, US

Amit Chhabra, Mount Laurel, NJ US

Patent application numberDescriptionPublished
20150287009SYSTEMS, METHODS, AND DEVICES FOR A COMMON APPLICATION ARCHITECTURE ON MULTIPLE POINT-OF-SALE HARDWARE PLATFORMS TO SUPPORT MULTIPLE APPLICATIONS - Embodiments of the present disclosure describe systems, methods, and devices for a common application architecture on multiple point-of-sale hardware platforms to support multiple applications. Such embodiments include monitoring, by for an event. Further, embodiments include selecting an application based on the event. In addition, the embodiments include monitoring a transaction implemented by the application based on the event. The monitoring for the event is performed when common application modules are in an idle state. Further, the selecting of the application based on the event is performed when the common application modules are in an application selection state. In addition, the monitoring transaction is performed when the common application modules are in a transaction state. Such embodiments include determining that the transaction is complete then transitioning from a transaction state to an idle state when the transaction is complete.10-08-2015
20150287090SYSTEMS, METHODS, AND DEVICES FOR OFFERING PROMOTIONAL MATERIALS TO CUSTOMERS BY MERCHANTS USING A POINT-OF-SALE TERMINAL - Embodiments of the present disclosure describe systems, methods, and devices for offering promotional materials to customers by merchants and rendering payment by merchants for third party services using a POS terminal. Such embodiments include configuring an offer by a merchant using a first POS terminal. Further, such embodiments include distributing the offer to a customer through a remote computer system. In addition, such embodiments include receiving, by the customer, the offer using a promotion module on a user device. Moreover, such embodiments include enrolling in the offer using the promotion module on the user device by providing customer-specific information to the promotion module. Such customer-specific information may include, but is not limited to, information regarding a payment card as well as any portable device having a radio frequency (RF) or near field communication (NFC) capability to render payment at a POS device.10-08-2015

Anshul Chhabra, Saratoga, CA US

Patent application numberDescriptionPublished
20120143942Delivering A Webpage To A Client - In certain embodiments, a server receives a request from a client for a webpage comprising portlets. A framework corresponding to the webpage is retrieved. The framework indicates whether a portlet is to be executed by the server or whether execution of the portlet is to be initiated by the client. The framework indicates that one or more first portlets are to be executed by the server. The server executes the first portlets to yield one or more first portlet markups. The first portlet markups are placed into the webpage. Execution of one or more second portlets is to be initiated by the client according to the framework. One or more placeholder tags for the second portlets are placed into the webpage. A placeholder tag allows the client to initiate execution of a second portlet. The webpage comprising the first portlet markups and the placeholder tags is sent to the client.06-07-2012

Arun Chhabra, League City, TX US

Patent application numberDescriptionPublished
20140157579Networked marketplace for custom 3D fabrication - 3D fabrication and rapid prototyping can quickly produce tightly toleranced arbitrary shapes in single units or small quantities. Yet its adoption has been limited in some promising market areas (for example, medical and dental prosthetics). Such products require diverse specialized process sequences that historically involve multiple vendors in long, close, service-intensive relationships. An online marketplace more evenly balances capacity utilization and negotiating strength within these complex supply chains while allowing preservation of existing relationships and service levels. Marketplace software embodiments enable any member of a supply chain to request a quotation for any stage(s) of a fabrication, invite bids, negotiate, award the project, and track its progress. Participants post, view, and collaboratively edit 3D point clouds generated by measurements or CAD. Options include directories, fora, automated regulatory compliance measures (privacy, long-term archival, data reporting), and structured-light metrology instruments configured to upload editable data directly to the marketplace.06-12-2014

Ashish Chhabra, San Jose, CA US

Patent application numberDescriptionPublished
20150348150UNPAID ITEM RISK MANAGEMENT - In an example embodiment, information about a buyer in an ecommerce system is obtained. An unpaid item risk assessment is calculated for the buyer, the unpaid item risk assessment calculating a risk that the buyer will not pay for an item on which the buyer bids. A bid limit is then established based on the unpaid item risk assessment. A bid from the buyer may then later be blocked based on the bid limit.12-03-2015

Avnish Kumar Chhabra, Redmond, WA US

Patent application numberDescriptionPublished
20090077648METHOD FOR MANAGING NETWORK FILTER BASED POLICIES - A method and system are provided for adding, removing, and managing a plurality of network policy filters in a network device. Filters are installed in a framework and designated as active or disabled. Each filter has a priority. When a new filter is to be installed into the framework, it is compared to installed filters to determine if a conflict exists. If no conflict exists, the new filter is added as an active filter. If a conflict exists, a higher priority conflicting filter is added as active and a lower priority filter is added as inactive.03-19-2009
20130254436TASK OFFLOAD TO A PERIPHERAL DEVICE - In one embodiment, to determine what tasks may be offloaded to a peripheral hardware device (e.g., to be performed in hardware on the peripheral device, rather than on the CPU(s) of the host computer), an indication from the at least one peripheral hardware device may be provided, without the peripheral hardware device first being queried to determine the task offload capabilities provided by the peripheral hardware device.09-26-2013

Patent applications by Avnish Kumar Chhabra, Redmond, WA US

Ekta Seth Chhabra, Framingham, MA US

Patent application numberDescriptionPublished
20150023959CHIMERIC FACTOR VIII POLYPEPTIDES AND USES THEREOF - The present invention provides a VWF fragment comprising the D′ domain and D3 domain of VWF, a chimeric protein comprising the VWF fragment and a heterologous moiety, or a chimeric protein comprising the VWF fragment and a FVIII protein and methods of using the same. A polypeptide chain comprising a VWF fragment of the invention binds to or is associated with a polypeptide chain comprising a FVIII protein and the polypeptide chain comprising the VWF fragment can prevent or inhibit binding of endogenous VWF to the FVIII protein. By preventing or inhibiting binding of endogenous VWF to the FVIII, which is a half-life limiting factor for FVIII, the VWF fragment can induce extension of half-life of the FVIII protein. The invention also includes nucleotides, vectors, host cells, methods of using the VWF fragment, or the chimeric proteins.01-22-2015
20150266943FACTOR VIII COMPLEX WITH XTEN AND VON WILLEBRAND FACTOR PROTEIN, AND USES THEREOF - The present invention includes a chimeric protein comprising a VWF protein with D′ domain and D3 domain of VWF, one or more XTEN sequence, and a FVIII protein, wherein the VWF fragment, the XTEN sequence, or the FVIII protein are linked to or associated with each other. The chimeric protein can further comprise one or more Ig constant region or a portion thereof (e.g., an Fc region). A polypeptide chain of a VWF fragment is associated with a FVIII polypeptide chain linked to an XTEN sequence. The VWF fragment polypeptide chain can prevent or inhibit binding of endogenous VWF to FVIII protein linked to the XTEN sequence. By preventing or inhibiting binding of endogenous VWF to FVIII protein, VWF fragment can extend half-life of chimeric protein comprising FVIII protein. The invention includes nucleotides, vectors, host cells, use of VWF fragment, or chimeric proteins.09-24-2015

Gurvinder Chhabra, San Diego, CA US

Patent application numberDescriptionPublished
20140126400METHOD AND APPARATUS FOR DOWNLINK/UPLINK FLOW CONTROL IN AN HSPA+ UE USING AUTONOMOUS CONNECTED DRX MODE TRIGGERING - A method, an apparatus, and a computer program product for wireless communication are provided in connection with controlling a flow of data in a user equipment (UE). In one example, a communications device is equipped to monitor at least one parameter related to processing of data at the UE, detect that the at least one parameter has passed a threshold, and autonomously trigger a discontinuous reception (DRX) mode of operation for the UE. In an aspect, the at least one parameter may include, but is not limited to, a data rate, Central Processing Unit (CPU) utilization, memory utilization, component temperature, etc. within the UE.05-08-2014

Gurvinder S. Chhabra, San Diego, CA US

Patent application numberDescriptionPublished
20090316904HARDWARE ACCELERATION FOR WWAN TECHNOLOGIES - Systems and methods for wireless communications are provided. These include data deciphering components, interrupt processing components, adaptive aggregations methods, optimized data path processing, buffer pool processing, application processing where data is formatted in a suitable format for a destination process, and Keystream bank processing among other hardware acceleration features. Such systems and methods are provided to simplify logic designs and mitigate processing steps during wireless network data processing.12-24-2009

Gurvinder Singh Chhabra, San Diego, CA US

Patent application numberDescriptionPublished
20130283280METHOD TO REDUCE MULTI-THREADED PROCESSOR POWER CONSUMPTION - Aspects of the disclosure generally relate to methods and apparatus for wireless communication. In an aspect, a method for dynamically processing data on interleaved multithreaded (MT) systems is provided. The method generally includes monitoring loading on one or more active processor threads, determining whether to remove a task or create an additional task based on the monitored loading of the one or more active processor threads and a number of tasks running on one or more of the one or more active processor threads, and if a determination is made to remove a task or create an additional task, distributing the resulting tasks among one or more available processor threads.10-24-2013
20140079215EFFICIENT CRYPTOGRAPHIC KEY STREAM GENERATION USING OPTIMIZED S-BOX CONFIGURATIONS - Application of a ZUC cryptographic functions in wireless communication includes receiving a data stream at the wireless communication apparatus and applying the ZUC cryptographic function to the data stream. The ZUC cryptographic function includes generating at least one multi-byte pseudo-random number that provides an index to one of a plurality of substitution boxes. Each of the substitution boxes is further based on one or more normative substitution boxes. The ZUC cryptographic function further includes retrieving a value from each of the substitution boxes using each byte of the multi-byte pseudo-random number, assembling the retrieved values into at least one substituted values, and generating at least one key value based on the substituted values, wherein the key value is used in applying the ZUC cryptographic function to the data stream. The method also includes processing the data stream after application of the ZUC cryptographic function.03-20-2014
20140079220STREAMING ALIGNMENT OF KEY STREAM TO UNALIGNED DATA STREAM - Enhanced cryptographic techniques are provided which facilitate higher data rates in a wireless communication system. In one aspect, improvements to the ZUC algorithm are disclosed which can reduce the number of logical operations involved key stream generation, reduce computational burden on a mobile device implementing ZUC, and extend battery life. The disclosed techniques include, for instance, receiving, at a wireless communication apparatus, a data stream having data packets for ciphering or deciphering. The wireless apparatus can generate a cipher key for the cryptographic function, determine a starting address of a first data packet in the data stream and shift the cipher key to align with the starting address of the first data packet. Once aligned, the processing apparatus applies the cryptographic function to a first block of the first data packet using the shifted cipher key and manages a remaining portion of the cipher key to handle arbitrarily aligned data across multiple packets03-20-2014
20140162620METHODS AND APPARATUS FOR UPDATING A DEVICE CONFIGURATION - Methods and apparatus are provided for device configuration (e.g., feature segment loading and system selection). Certain aspects of the present disclosure generally relate to operating a user equipment (UE) in a first radio access network (RAN) with a first set of modem features that supports the first RAN, detecting a second RAN not supported by the first set of modem features, and rebooting the modem software to load a second set of modem features that supports the detected RAN. For certain aspects, the first RAN may be a Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) network and the second RAN may be a Wideband-Code Division Multiple Access (W-CDMA) network or Long-Term Evolution (LTE) network. This allows features to be loaded into memory (e.g., only) when they are required to support a detected RAN, rather than loading an entire image, thereby conserving DRAM and increasing efficiency.06-12-2014

Jasmeet Chhabra US

Patent application numberDescriptionPublished
20130191888METHOD, APPARATUS, AND SYSTEM FOR SENDING CREDENTIALS SECURELY - A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed.07-25-2013

Kapil Chhabra, Cupertino, CA US

Patent application numberDescriptionPublished
20130303232METHODS AND APPARATUS FOR LOCATION-BASED PARAMETRIC CONTROL - Methods and apparatus for location-based control of parameters such as radio frequency (RF) transmission characteristics of a wireless device. In one embodiment, a determination of a maximum allowable level for a given characteristic associated with the location of the wireless device is made, and the transmission characteristic of the wireless device is adjusted based at least in part on this maximum allowable level. The location may correspond to a regulatory domain with specific requirements for wireless transmitters. A database is referenced to retrieve these requirements. The maximum allowable levels are derived from the requirements. Thus, exemplary wireless devices are capable of universal regulatory compliance.11-14-2013
20140003408METHODS AND APPARATUS FOR NETWORK SELECTION IN OVERLAPPING NETWORK ENVIRONMENTS01-02-2014
20140362835System and Method for Cloud Synchronizing Known Networks - A system and method synchronizes network data for a device registered to a user. The network data includes a list of a plurality of known wireless networks and authentication data associated with each of the known wireless networks. The method includes establishing a connection to a server of a synchronization network. The method includes transmitting identification data to the server. The identification data indicates the network data corresponding to the user to which the device is registered. The method includes receiving the list of known wireless networks from the server via the synchronization network. The method includes receiving a secure file including the authentication data from the server via the synchronization network.12-11-2014
20140365669Device and Method for Associating with WiFi Networks - A method automatically connects a device to a WiFi network. The method includes determining WiFi networks that are available for a connection thereto. The method includes categorizing each of the WiFi networks as a private WiFi network or a public WiFi network in which the private WiFi network utilizes a first association process while the public WiFi network utilizes a second association process. The method includes executing a first automatic connection process using the first association process until a successful connection is established to one of the private WiFi networks based upon a first prioritized list. The method includes executing a second automatic connection process until a successful connection is established to one of the public WiFi networks based upon a second prioritized list when the first automatic connection process to the private wireless networks is unsuccessful.12-11-2014
20150092652Wireless Multicast Communication - This document describes multicast communication between wireless devices. A scheduling frame may be wirelessly transmitted by a wireless device. The scheduling frame may include a multicast address indicating a group of intended receiving devices for a payload frame. The scheduling frame may further include scheduling information indicating an order for the group of intended receiving devices to transmit acknowledgement information for the payload frame. A payload frame may also be wirelessly transmitted by the wireless device. The payload frame may include payload information intended for the group of intended receiving devices. Additionally, acknowledgement frames may be wirelessly received by the wireless device from at least a subset of the group of intended receiving devices. The acknowledgement frames may be received according to the order indicated in the scheduling information.04-02-2015
20150350875Device and Method for Basic Service Set Transition Management - A method, station and computer readable storage medium used to perform a roaming procedure. The method performed by the station including determining whether a roam is to be performed, the station being associated with a first access point (AP), receiving network related information for at least one second AP, determining a score value for each of the at least one second AP based upon the network related information, the score value being either a quantitative score calculated as a function of a respective received signal strength indicator (RSSI) value and a respective load value or a qualitative score calculated as a function of a preference value and the RSSI value, selecting one of the at least one second AP based upon the score values and roaming from the first AP to the selected one of the at least one second AP.12-03-2015
20150350911System and Method for Temporarily Joining a WiFi Network - A system, method and station used to establish a guest connection to a WiFi network. A first station establishes a first connection to a second station using a first communication mechanism, receives a data block from the second station, the data block including network information based upon a Basic Service Set (BSS) identification (BSSID) corresponding to a access point of a WiFi network to which the second station has connected, authentication information for connecting to the WiFi network and a time field indicating an amount of time the first station is allowed to access the WiFi network using the data block, establishes a second connection to the WiFi network using a second communication mechanism based upon the network information and authentication information of the data block and disconnects the second connection when the amount of time expires.12-03-2015
20150350933Wireless Link Quality Monitoring - Wi-Fi link health monitoring by a wireless device. Signal strength (e.g., RSSI) of a Wi-Fi link may be monitored. If the signal strength is low, further link quality metrics may be monitored. If it is determined that health of the Wi-Fi link is poor based on monitoring signal strength and other link quality metrics, roaming to a different Wi-Fi network may be performed, the Wi-Fi link may be disconnected, and/or an application processor of the wireless device may be woken.12-03-2015
20150350957Device and Method for Reliable WiFi Data Connectivity - A station and non-transitory computer readable storage medium for determining a first physical layer rate to perform data transmissions between the station and an access point of a WiFi network, the first physical layer rate being based on a primary rate and a plurality of fallback rates associated with the access point, the primary rate having a higher transmission speed than the plurality of fallback rates, determining a trigger based upon at least one current condition of the station and at least one corresponding prior condition existing at a time when the first physical layer rate is determined, selecting one of the plurality of fallback rates when the trigger is determined, performing data transmissions between the station and the access point using the one of the plurality of fallback rates and determining a second physical layer rate based on the one of the plurality of fallback rates.12-03-2015
20150350993Device and Method for Opportunistic Roaming - A method, station and computer readable storage medium used to perform opportunistic roaming procedures. A station joined to a basic service set (BSS) of an access point (AP) performs a method including determining a roam profile for the station, the roam profile indicating at least one of available operating bands or available APs for the station, determining a first value associated with a network parameter of the joined AP, determining at least one roam candidate AP having a second value associated with the network parameter corresponding to the roam candidate AP, wherein the first and second values are a received signal strength indicator, determining whether a predetermined criteria value is satisfied based upon the first and second values, wherein the predetermined criteria value is a minimum difference between the first value and second value and roaming to the roam candidate AP when the predetermined criteria value is satisfied.12-03-2015
20150351012Device and Method for WiFi Scan Optimization - A method and wireless station used to perform WiFi scans. The wireless station determines a first cell identity of a first cell to which the wireless station is currently connected, determines a second cell identity of a second cell that is available, determines whether either of the first or second cell identities are related to a WiFi network based on relationships between cell identities and WiFi networks stored in the wireless station, performs a first type of scan for available WiFi networks when either of the first cell identity or the second cell identity is related to the WiFi network and performs a second type of scan for available WiFi networks when neither of the first cell identity or the second cell identity is related to the WiFi network, the first type of scan is performed more frequently or over more channels compared to the second type of scan.12-03-2015
20150373633Co-Located Network Selection Algorithm - A wireless device may automatically connect to a preferred wireless network, such as a preferred Wi-Fi network. The wireless device may order a plurality of wireless networks according to initial criteria, such as the time the wireless device last connected to each wireless network. Preference rules may then be applied to reorder the wireless networks. Each preference rule may be applied only if an associated score meets a threshold. A scan may be performed to determine which of the wireless networks are available for connection. The wireless device may automatically connect to the highest-ordered available wireless network. The scores associated with the preference rules may be modified in response to events that indicate a user preference for one or more of the wireless networks, such as manually switching from one network to another.12-24-2015

Patent applications by Kapil Chhabra, Cupertino, CA US

Kapil Chhabra, Sunnyvale, CA US

Patent application numberDescriptionPublished
20090011834LOCATION AWARE AD-HOC GAMING - A method of mobile gaming is disclosed. The method includes configuring a mobile device to communicate in a first communication protocol and a second communication protocol, determining location information for the mobile device, communicating the location information and a gaming request via the first communication protocol to a game server, receiving a gaming request response from the game server via the first communication protocol, initiating a gaming session in response to the gaming request response, wherein the gaming session is conducted via the second communication protocol.01-08-2009
20090103503Location Aware Background Access Point Scanning for WLAN - Respective distances between a communication device and a plurality of wireless local area network (WLAN) access points are determined. One of the plurality of WLAN access points with which the communication device is to associate is selected based on the determined distances04-23-2009
20090278705SYSTEMS AND METHODS FOR PROVIDING LOCATION-AWARE WI-FI ACCESS FOR A PORTABLE DEVICE - Methods and systems for providing location-aware WiFi access for a portable device include determining an initial location of the portable device and transmitting the initial location to a WiFi location provider, wherein the WiFi location provider comprises locations and WiFi parameters for a plurality of WiFi access points, wherein each WiFi access point has a corresponding wireless range. The locations and the WiFi parameters for a set of WiFi access points are then received from the WiFi location provider, wherein the set of WiFi access points are within a radius of the initial location of the portable device. At least one WiFi access point in the set of WiFi access points is scanned for that contains the portable device within its wireless range. The portable device then connects to the at least one WiFi access point, thereby forming a WiFi connection.11-12-2009
20130010665AD-HOC NETWORK POWER SAVE SYSTEM AND METHOD - Symmetrical and asymmetrical ad-hoc, wireless networks and a method for saving power in the same may include causing a first station to determine whether a second station has a master capability to buffer data traffic for the first station. A first station requests the second station to buffer the data traffic intended for the first station for a first predetermined period. The first station enters a first power save mode, and the second station buffers the data traffic for the first station for the first predetermined period. The first station exits the first power save mode after the first predetermined period and the second station sends the buffered data traffic to the first station. Both the first and second stations may have master capabilities, or only one of the first and second stations may have a master capability.01-10-2013
20130094390LOCATION AWARE BACKGROUND ACCESS POINT SCANNING FOR WLAN - Respective distances between a communication device and a plurality of wireless local area network (WLAN) access points are determined. One of the plurality of WLAN access points with which the communication device is to associate is selected based on the determined distances.04-18-2013
20140051361LOCATION AWARE AD-HOC GAMING - A method of mobile gaming is disclosed. The method includes configuring a mobile device to communicate in a first communication protocol and a second communication protocol, determining location information for the mobile device, communicating the location information and a gaming request via the first communication protocol to a game server, receiving a gaming request response from the game server via the first communication protocol, initiating a gaming session in response to the gaming request response, wherein the gaming session is conducted via the second communication protocol.02-20-2014
20140112197AD-HOC SIMPLE CONFIGURATION - A protocol governing the operation of an ad-hoc WLAN enables each device in the WLAN to be configured as a registrar and/or an enrollee. Accordingly, each device is configurable to support both the registrar as well as enrollee modes of operations. In response to a time-driven user action, the device may be configured to enter into a registrar mode or an enrollee mode. While in the registrar mode, the device enters into an aggressive beaconing phase by setting its beacon contention window to a relatively very small value. The aggressive beaconing increases the probability of the discovery of the registrar by the enrollees. Optionally the device may prompt the user to select between a registrar and an enrollee mode of operation by displaying the option on an LCD panel.04-24-2014
20140258550AUTOMATIC AD-HOC NETWORK CREATION AND COALESCING USING WPS - A device previously configured as a registrar and that has established an independent ad-hoc network is automatically discovered by another device also previously configured as a registrar. To form an ad-hoc wireless network between these two devices, each device periodically enters a scanning mode to scan for and intercept beacons transmitted by the other device. Upon such interception, one of the devices becomes an enrollee in accordance with a predefined condition and in response to a user selected option. Subsequently, the enrollee modifies its beacons to include an attribute, such as the MAC address, associated with the other device. After intercepting the modified beacon, the remaining registrar prompts it user to decide whether to allow the enrollee to join the registrar's network. If the user responds affirmatively, a handshake is performed between the two devices and a subsequent attempt is made by the enrollee to join the registrar's network.09-11-2014

Patent applications by Kapil Chhabra, Sunnyvale, CA US

Kapil Chhabra, Millpitas, CA US

Patent application numberDescriptionPublished
20140105084APPLICATION-AWARE RADIO POWER SAVING - In order to facilitate reduced power consumption of an electronic device (such as a smartphone) when communicating with another electronic device (such as an access point) in a wireless network, the electronic device may change a wake policy based on the applications executing on the electronic device. In particular, the electronic device may monitor a subset of the applications currently executed by a processor in the electronic device, where the subset can include zero or more of the applications. Based on the subset, the wake policy of an interface circuit in the electronic device may be changed. This wake policy may specify a frequency of wake ups to receive information from the other electronic device and/or monitoring of unicast or multicast bits in a Traffic Indication Map element. In this way, the time that the electronic device is in the active mode can be reduced, thereby reducing power consumption.04-17-2014

Kapil Chhabra, Milpitas, CA US

Patent application numberDescriptionPublished
20100157865Power-Save for Wireless Networks - Embodiments of the present invention enable power-save methods for wireless networks. Embodiments of the present invention are compliant with the IEEE 802.11 protocol. Further, embodiments of the present invention are readily inter-operable with other third party implementations.06-24-2010
20110305264Beacon Miss Prevention in Power Save Modes Using Timing Synchronization Function - An integrated circuit comprising a transceiver module, a beacon miss module, and a control module. The transceiver module is configured to, at predetermined times, transition a wireless network device from an inactive mode to an active mode. The beacon miss module is configured to count a number of delivery traffic indication message (DTIM) beacons missed by the transceiver module during each of a first predetermined period and a second predetermined period, wherein the first predetermined period is shorter than the second predetermined period. The control module is configured to adjust the predetermined times at which the wireless network device is transitioned from the inactive mode to the active mode based on the number of the DTIM beacons missed by the transceiver module during each of i) the first predetermined period and ii) the second predetermined period.12-15-2011
20130077549INTEGRATED CIRCUIT AND METHOD WITH PRE-BEACON ACTIVATION TIME ADJUSTMENT - An integrated circuit including a transceiver module that receives beacons from an access point (AP), and transition a wireless network device to an active mode based on: a predetermined beacon interval; and a first predetermined period prior to one of multiple beacons. A timestamp module calculates a first correction value based on a first timestamp received from the AP. An adjustment module adjusts the first predetermined period based on the first correction value. A beacon module detects a beacon missed during an inactive mode by the transceiver module. The timestamp module transmits a probe request signal to the AP a second predetermined period after detection of the missed beacon, receives a second timestamp from the AP in response to the probe request signal, and recalculates the first correction value based on the second timestamp. The adjustment module adjusts the first predetermined period based on the recalculated first correction value.03-28-2013
20130150012MECHANISMS TO IMPROVE MOBILE DEVICE ROAMING IN WIRELESS NETWORKS - A mobile wireless device adapts roaming parameters used to determine searching for and switching among access points. The roaming parameters are adjusted based on a wireless network characterization for access points that includes a detected wireless network type. In an embodiment, the wireless network type is characterized by a service set identifier and a number of unique basic service set identifiers associated with the service set identifier per radio frequency band. Roaming parameters include a scan threshold, a roam threshold and a time interval between successive scans.06-13-2013
20130225161SEAMLESS TRANSITION FROM CELLULAR TO Wi-Fi COMMUNICATION - An electronic device receives a list of available networks and associated access credentials via a cellular-telephone network. These available networks may be other than the cellular-telephone network and may use a communication technique other than a cellular-telephone communication technique, such as an IEEE 802.11 protocol. For example, a base station in the cellular-telephone network may track the location of the electronic device, and may provide the list to the electronic device when the cellular-telephone network performance is constrained or degraded. In response to receiving the list, the electronic device may select a network from the available networks based on a communication criterion, such as: proximity to the electronic device, a signal strength, security, and/or communication quality. Information specifying this selection may be provided via the cellular-telephone network, and then instructions that transition communication with the electronic device from the cellular-telephone network to the selected network may be received.08-29-2013
20130288601AUTOMATIC CONFIGURATION OF ELECTRONIC DEVICES - The disclosed embodiments provide a system that facilitates the configuration of a first electronic device. During operation, the system detects a non-configured state of the first electronic device in proximity to a second electronic device. Next, the system establishes a network connection between the first and second electronic devices. Finally, the system uses the network connection to transmit configuration information from the second electronic device to the first electronic device, wherein the configuration information is used to configure the first electronic device without receiving manual input from a user through a user interface of the first electronic device.10-31-2013
20130331098Automatically Determining and Alerting Users to Available Wireless Networks - Automatically determining and alerting a user to available wireless networks. Initially, the method may automatically determine that one or more wireless networks are available to a wireless device at a location. The method may determine if the wireless device has been present at the first location for more than a threshold amount of time, e.g., based on periodic determination of the available wireless networks to the wireless device. Based on the wireless device being present at the first location for more than the threshold amount of time, an alert may be automatically displayed to the user on a display of the wireless device. The alert may indicate at least one wireless network of the one or more wireless networks at the first location. The wireless device may connect to wireless network indicated by the alert in response to user input.12-12-2013
20130331101Automatically Modifying Wireless Network Connection Policies Based on User Activity Levels - Modifying network connection policies of a wireless device based on user activity levels. One or more activity indicators of the wireless device may be monitored. One or more criteria for wireless network blacklisting may be selected based on the one or more activity indicators. The criteria may include different types of connectivity problems. A wireless network may be detected. The wireless network may be monitored for connectivity problems. The wireless network may be blacklisted if connectivity problems meeting the selected criteria for wireless network blacklisting are determined to have occurred.12-12-2013
20130331118PERFORMING ENHANCED BACKGROUND LOCATION SCANS TO FACILITATE LOCATION-BASED GEO-FENCING - The disclosed embodiments facilitate location awareness in mobile computing devices while also reducing power consumption. A baseband processor performs background scanning of wireless networks, tracking the status of surrounding wireless networks while a primary application processor operates in a lower-power sleep state. Upon detecting a wireless network of interest, the baseband processor notifies (and wakes up) the application processor. The baseband processor can also be configured to track a subset of the wireless networks detected from previous scans to facilitate trajectory tracing.12-12-2013
20130332598INTERNET PROTOCOL ADDRESS IPv4/IPv6 BASED PACKET FILTERING IN WoWLAN MODE - One embodiment of the present invention provides a system configured to apply Internet Protocol (IP) address based packet filtering prior to entering Wake on Wireless LAN (WoWLAN) mode. During operation, the system receives a request to enter WoWLAN mode. In response to this request, the system collects a set of active IP addresses, as well as a set of active ports. Next, the system filters out packets destined to IP addresses that are not members of the set of active IP addresses, and ports that are not members of the set of active ports. Finally, the system enters WoWLAN mode.12-12-2013
20130332599NEIGHBOR DISCOVERY OFFLOAD IN MOBILE DEVICES - One embodiment of the present invention provides a system that facilitates offloading neighbor discovery from a host prior to the host entering Wake on Wireless LAN (WoWLAN) mode. During operation, the system receives a request from a host executing on the processor to enter WoWLAN mode. Next, the system collects a set of active IP addresses on the host. The system then places the apparatus in WoWLAN mode. Next, the system receives neighbor discovery requests from IP addresses external to the host at a networking chip external to the processor. The system then responds to the neighbor discovery requests from the networking chip on behalf of the host and without waking the host from WoWLAN mode for requests destined to IP addresses that are members of the set of active IP addresses. Finally, the system also prevents, at the networking chip, the neighbor discovery requests from waking the host.12-12-2013
20140064140QUICKLY JOINING WI-FI NETWORKS USING NEIGHBORING ACCESS POINTS - One embodiment of the present invention provides a device for joining a known Wi-Fi network. During operation, the device performs a scanning operation during a scanning process to find a known access point of a WLAN for the device to join. Next, if the scanning operation finds an access point, the device determines whether the access point neighbors a known access point. If so, the device attempts to associate with the known access point by performing a scanning operation on the specific channel associated with the known access point.03-06-2014
20140068727WI-FI CREDENTIAL SHARING USING IMAGES - In order to facilitate access to a wireless network, access information (and, more generally, credentials) may be provided to an electronic device via an image. In particular, the electronic device may capture an image that includes a representation of the access information. For example, the electronic device may scan a two-dimensional representation of the access information, such as a Quick Response (QR) code. Then, the electronic device may analyze the image to extract the access information. Next, the access information may be used to access the wireless network. This communication technique allows a user of the electronic device to access the wireless network with less effort, thereby improving the user's experience.03-06-2014
20140086233SYNCHRONIZATION REQUESTS TO REDUCE POWER CONSUMPTION - An electronic device is described. In order to facilitate the communication of synchronization information with another electronic device in a wireless network, the electronic device provides a request for the synchronization information to the other electronic device at a time other than a predefined synchronization transmission time of the other electronic device. Then, the electronic device receives the synchronization information from the other electronic device in response to the request. In this way, the probability that the synchronization information is successfully communicated is increased, and the amount of time the electronic device is in an active mode is reduced, thereby reducing power consumption.03-27-2014
20140092889Method and Apparatus for Providing Location-Aware Wi-Fi Access - Methods and systems for providing location-aware WiFi access for a portable device include receiving, at a mobile communication device, locations and ranges for a set of one or more WiFi access points from a location provider system. The mobile communication device uses the locations and ranges to determine whether to power on a WiFi transceiver, and to determine for which WiFi access points to scan if the WiFi transceiver is powered on.04-03-2014
20140098729BUFFERED INDICATION OF INDIVIDUALLY ADDRESSED TRAFFIC WITH REDUCED POWER CONSUMPTION - Embodiments provide a technique for enabling a wireless device to operate in a power saving mode without completely cutting off the wireless device from receiving outside communications. The technique includes, at an access point (AP), generating traffic indication map (TIM) information that indicates whether downlink data directed to the wireless device is buffered at the AP. The AP precedes a beacon frame with at least one “lightweight” traffic indication map (TIM) frame that includes the TIM information, which is a subset of the information that is included in the beacon frame. The AP can be configured to transmit the TIM broadcast frame, the beacon frame, and any other frames that include the TIM information during a single transmit opportunity to reduce the number of instances where the wireless device is required to transition from an idle state to a listen state.04-10-2014
20140105086MOTION-BASED ADAPTIVE SCANNING - In order to facilitate reduced power consumption of an electronic device (such as a smartphone) when communicating with another electronic device (such as an access point) in a wireless network, the electronic device may change a frequency of network scans performed by an interface circuit in the electronic device based on a motion profile of the electronic device. In particular, the electronic device may determine the motion profile based on spatial information, such as: acceleration data, orientation data, Global Positioning System data and/or data from the wireless network. Then, the electronic device may change the frequency of the network scans performed by the interface circuit based on the motion profile. In this way, the frequency of the network scans can be reduced when the electronic device is stationary or moving rapidly (such as when a user of the electronic device is driving in a car).04-17-2014
20140105195DETECTING NEIGHBORING ACCESS POINTS IN A NETWORK - An electronic device, e.g., a mobile device, having access to a wireless network roams from one access point (AP) to another using access point detection based on location and learning. A learning scheme may modify a list of nearby access points determined based on location to identify neighboring access points where roaming is possible. The identified neighboring access points where roaming is possible may be ordered based on roaming history, such as the frequency of the roams to a particular AP. The roaming history may be maintained on a per client basis or aggregated across all clients using an AP.04-17-2014
20140105197LOCATION AWARE BACKGROUND ACCESS POINT SCANNING FOR WLAN - Respective distances between a communication device and a plurality of wireless local area network (WLAN) access points are determined. One of the plurality of WLAN access points with which the communication device is to associate is selected based on the determined distances. A background scanning process is initiated based on determined distances. The background scanning process includes at least selecting one of the plurality of WLAN access points with which the communication device is to associate based on the determined respective distances by evaluating the plurality of WLAN access points in an order based on the determined respective distances. If it is determined that a WLAN access point is acceptable, evaluation of the plurality of WLAN access points is stopped before all of the plurality of WLAN access points have been evaluated.04-17-2014
20140128063Extending Use of a Cellular Communication Capabilities in a Wireless Device to Another Device - Extending cellular telecommunication service from a first UE to another device. The first UE may register for cellular telecommunication service with a cellular network using a first cellular service account, using a cellular communication link via a cellular radio. A second device may be discovered and a communication link may be established between the first UE and the second device. The second device may be registered to use cellular telecommunication capability provided by the first UE. Communications between the second device and the cellular network may be conveyed via the communication link between the first UE and the second device and the cellular communication link. Conveying communications between the second device and the cellular network may provide use of the first cellular service account for cellular telecommunication service to the second device.05-08-2014
20140211676DYNAMIC ADAPTATION OF A TRAFFIC INACTIVITY TIMER - A method for dynamically adapting a traffic inactivity timer is disclosed. The method can include a wireless communication device determining a data traffic level on a wireless network interface and determining whether the data traffic level exceeds a threshold data traffic level. The method can further include the wireless communication device using a first inactivity timeout period for the traffic inactivity timer in an instance in which it is determined that data traffic level does not exceed the threshold data traffic level. The method can additionally include the wireless communication device using a second inactivity timeout period for the traffic inactivity timer in an instance in which it is determined that the data traffic level exceeds the threshold data traffic level. The second inactivity timeout period can define a longer time period than the first inactivity timeout period.07-31-2014
20140233406DETERMINING PARAMETERS OF AN ACCESS POINT - A method and system are described for determining parameters of an access point (AP). In the described embodiments, during a first time period, a portable electronic device (PED) scans for APs on a wireless local area network (WLAN) channel. Then, when an AP is detected on the WLAN channel, the PED determines if the AP includes a general advertisement service (GAS) protocol to make available information related to services provided by the AP. If the AP includes the GAS protocol, then the PED transmits a GAS request frame to the AP. If a response to the GAS request frame is not received from the AP within the first time period, then the PED extends the dwell time to wait for the response for a second time period, wherein a duration of the second time period is determined based on a total allowable time to scan for APs.08-21-2014
20140254443ELECTRONIC DEVICE WITH LOW-POWER ROAMING - A low-power roaming mechanism is described. This low-power roaming mechanism is used by a portable electronic device when the portable electronic device enters a stand-by mode (sleep mode). During this stand-by mode, the portable electronic device allows a wireless interface to look for surrounding wireless networks with a configurable quota. This quota is allotted for roaming based on the usage or communication pattern of the portable electronic device. Once the allotted quota is completely used, the portable electronic device is blocked from performing roaming operations to prevent the portable electronic device from draining the battery.09-11-2014
20140267135APPLICATION-BASED TOUCH SENSITIVITY - A sensing threshold of a touch sensing surface may be specified based on a user interface context. For example, inadvertent touches may be more likely in a map application that is often used in a car where a user experiences constant jostling. Accordingly, a high sensing threshold can be associated with the map application, and other applications can be associated with a lower sensing threshold.09-18-2014
20140269404DETERMINING THE RELIABILITY OF COMMUNICATIONS BETWEEN A PORTABLE ELECTRONIC DEVICE AND AN ACCESS POINT - A method and system are described for determining the reliability of the communications between a portable electronic device and an access point (AP) before associating with the AP. In the described embodiments, a first probe request frame is transmitted to the AP at a first data rate, and a first probe response frame is received from the AP, wherein the first probe response frame is responsive to the first probe request frame. Then, a second probe request frame is transmitted to the AP at a second data rate, wherein the first data rate is lower than the second data rate. Then, the portable electronic device determines if a second probe response frame is received from the AP, wherein the second probe response frame is responsive to the second probe request frame. The portable electronic device then determines the reliability of the communications between the portable electronic device and the AP.09-18-2014
20150181637Extending Use of a Cellular Communication Capabilities in a Wireless Device to Another Device - Extending cellular telecommunication service from a first UE to another device. The first UE may register for cellular telecommunication service with a cellular network using a first cellular service account, using a cellular communication link via a cellular radio. A second device may be discovered and a communication link may be established between the first UE and the second device. The second device may be registered to use cellular telecommunication capability provided by the first UE. Communications between the second device and the cellular network may be conveyed via the communication link between the first UE and the second device and the cellular communication link. Conveying communications between the second device and the cellular network may provide use of the first cellular service account for cellular telecommunication service to the second device.06-25-2015
20150223070CUSTOMER IDENTIFICATION FOR SEAMLESS WIRELESS-NETWORK ACCESS - An electronic device connects to a network associated with a service provider via a router at a home location. During a time interval, the electronic device provides information specifying a network address of the router to an authentication computer when the electronic device is connected to a network. The authentication computer uses the received information to determine a connection pattern of the electronic device. Moreover, the authentication computer identifies that the electronic device is at the home location based on the connection pattern. Then, the authentication computer provides, to an accounting computer associated with the service provider, a request to allow the electronic device to access a wireless network associated with the service provider at a remote location (which is other than the home location). Furthermore, the authentication computer communicates network information to the electronic device, which allows the electronic device to access the wireless network without providing authentication information.08-06-2015
20160037439METHOD AND APPARATUS FOR AUTOMATICALLY DETECTING AND CONNECTING TO WI-FI NETWORKS - An apparatus and methods are provided for automatically detecting and connecting to a Wi-Fi network. In these methods, a wireless device listens for beacons that are sent using a low-power wireless protocol. Once the wireless device detects a first beacon at a first location, the wireless device extracts a first beacon region identifier from the beacon and correlates the first beacon region identifier with a first Wi-Fi network that is located at the first location. Next, the wireless device retrieves a first set of credentials for connecting to the first Wi-Fi network. Once the first set of credentials is retrieved, the wireless device uses the first set of credentials to connect to the first Wi-Fi network.02-04-2016

Patent applications by Kapil Chhabra, Milpitas, CA US

Kapil Chhabra, Miplitas, CA US

Patent application numberDescriptionPublished
20130343198BEACON FRAME MONITORING - Techniques are disclosed relating to reception of beacon frames. In one embodiment, an apparatus is disclosed that includes a radio circuit. The radio circuit is configured to determine an estimated time period during which the radio circuit will receive a next beacon frame from a wireless access point associated with a wireless channel. The estimated time period is determined relative to a clock of the radio circuit. The radio circuit is further configured to begin monitoring the wireless channel for the next beacon frame during the estimated time period.12-26-2013

Lovlesh Chhabra, San Jose, CA US

Patent application numberDescriptionPublished
20160044509SERVICES ACCESS FOR MOBILE DEVICES - Briefly, embodiments of methods and/or systems of services access through progressive registration via a mobile device.02-11-2016

Mahendra Chhabra, Stanford, CA US

Patent application numberDescriptionPublished
20120121823PROCESS FOR LOWERING ADHESION LAYER THICKNESS AND IMPROVING DAMAGE RESISTANCE FOR THIN ULTRA LOW-K DIELECTRIC FILM - An improved method for depositing an ultra low dielectric constant film stack is provided. Embodiments of the invention minimize k (dielectric constant) impact from initial stages of depositing the ultra low dielectric constant film stack by reducing a thickness of an oxide adhesion layer in the ultra low dielectric film stack (<2 kÅ) to about or less than 200 Å, thereby lowering the thickness non-uniformity of the film stack to less than 2%. The improved process deposits the oxide adhesion layer and the bulk layer in the ultra low dielectric film stack at lower deposition rate and lower plasma density in combination with higher total flow rate, resulting in better packing/ordering of the co-deposited species during film deposition which causes higher mechanical strength and lower porosity. The improved adhesion layer provides high adhesion energy for better adhesion with ultra low dielectric constant films to underlying barrier/liner layers. The resulting low dielectric film has nanometer-sized pores and tighter pore-size distribution, yielding a low dielectric constant film with a dielectric constant of about 2.5 or less.05-17-2012
20130344704ENHANCEMENT IN UV CURING EFFICIENCY USING OXYGEN-DOPED PURGE FOR ULTRA LOW-K DIELECTRIC FILM - Embodiments of the invention provide methods for curing an ultra low-k dielectric film within a UV processing chamber. In one embodiment, the method includes depositing an ultra low-k dielectric layer on a substrate in a deposition chamber, and subjecting the deposited ultra low-k dielectric layer to a UV curing processes in a UV processing chamber. The method includes stabilizing the UV processing chamber by flowing an oxygen gas and a purge gas into the UV processing chamber at a flow ratio of about 1:50000 to about 1:100. While flowing the oxygen-doped purge gas, the substrate is exposed to UV radiation to cure the deposited ultra low-k dielectric layer. The inventive oxygen-doped purge curing process provides an alternate pathway to build silicon-oxygen network of the ultra low-k dielectric material, thereby accelerating cross-linking efficiency without significantly affecting the film properties of the deposited ultra low-k dielectric material.12-26-2013

Mahendra Chhabra, San Jose, CA US

Patent application numberDescriptionPublished
20140053866METHOD AND HARDWARE FOR CLEANING UV CHAMBERS - A cleaning method for a UV chamber involves providing a first cleaning gas, a second cleaning gas, and a purge gas to one or more openings in the chamber. The first cleaning gas may be an oxygen containing gas, such as ozone, to remove carbon residues. The second cleaning gas may be a remote plasma of NF02-27-2014
20150368803UV CURING PROCESS TO IMPROVE MECHANICAL STRENGTH AND THROUGHPUT ON LOW-K DIELECTRIC FILMS - A low k porous dielectric film with improved mechanical strength and methods for making the same are disclosed herein. A method of forming a dielectric layer can include positioning a substrate in a processing chamber, delivering a deposition gas to the processing chamber, depositing a dense organosilicon layer using the deposition gas on the surface of the substrate, the dense organosilicon layer comprising a porogenic carbon, forming a pore-forming plasma from a reactant gas, exposing the dense organosilicon layer to the pore-forming plasma to create a porous organosilicon layer, wherein the pore-forming plasma removes at least a portion of the porogenic carbon and exposing the porous organosilicon layer to ultraviolet (UV) radiation.12-24-2015

Maninder Chhabra US

Patent application numberDescriptionPublished
20090119326MESSAGE CONTROLLER WITH DYNAMICALLY LOADABLE MESSAGE DESCRIPTOR - A dynamic message controller is provided. The message provider includes a plurality of message descriptors and a message parser. Each message descriptor includes a unique pattern for a message that corresponds to a specific type of message received by the message controller. The message parser module is configured to match incoming messages with a select one of the message descriptors based on matched message patterns. The message parser module is further configured to load the matched message descriptor and parse an associated incoming message based on the matched message descriptor.05-07-2009

Manish R. Chhabra, Sterling, VA US

Patent application numberDescriptionPublished
20120110175SYSTEM AND METHOD FOR ANALYZING WEB PATHS - A method for analyzing web page paths associated with accesses to one or more web pages associated with one or more websites is disclosed. The method includes storing, for each instance of a web page access of the one or more web pages, time of access data, page access data, and entity data. The method further includes, for each entity reflected in the storage, determining one or more web page paths traversed by the entity based at least on the time of access data and the page access data, wherein each path includes accesses to at least two web pages. The method additionally includes analyzing at least one of the one or more websites or at least one of the one or more web pages, based on the determined one or more web page paths, and providing the analysis to one or more users or software processes.05-03-2012

Milloni B. Chhabra, Durham, NC US

Patent application numberDescriptionPublished
20110053160HCV NS3/4A REPLICON SHUTTLE VECTORS - The present invention provides for novel HCV NS3/4A replicon shuttle vectors useful for cloning in HCV polynucleotide sequences from samples of HCV-infected patients and testing the resulting replicons for drug susceptibility.03-03-2011

Mohak Chhabra, Morrisville, NC US

Patent application numberDescriptionPublished
20120153909HYBRID FAST-SLOW PASSGATE CONTROL METHODS FOR VOLTAGE REGULATORS EMPLOYING HIGH SPEED COMPARATORS - Voltage regulator circuits and methods implementing hybrid fast-slow passgate control circuitry are provided to minimize the ripple amplitude of a regulated voltage output. In one aspect, a voltage regulator circuit includes a comparator, a first passgate device, a second passgate device, and a bandwidth limiting control circuit. The comparator compares a reference voltage to a regulated voltage at an output node of the voltage regulator circuit and generates a first control signal on a first gate control path based on a result of the comparing. The first and second passgate devices are connected to the output node of the regulator circuit. The first passgate device is controlled in a bang-bang mode of operation by the first control signal to supply current to the output node. The bandwidth limiting control circuit has an input connected to the first gate control path and an output connected to the second passgate device. The bandwidth limiting control circuit generates a second control signal based on the first control signal, wherein the second control signal is a slew rate limited version of the first control signal, and wherein the second passgate is controlled by the second control signal to supply current to the output node.06-21-2012

Navjot Chhabra, Austin, TX US

Patent application numberDescriptionPublished
20130049217SEMICONDUCTOR DEVICE PACKAGING HAVING PRE-ENCAPSULATION THROUGH VIA FORMATION USING DROP-IN SIGNAL CONDUITS - A semiconductor device package having pre-formed and placed through vias and a process for making such a package is provided. One or more signal conduits are placed in a holder that is subsequently embedded in an encapsulated semiconductor device package. The ends of the signal conduits are exposed and the signal conduits are then used as through package vias, providing signal-bearing pathways between interconnects or contacts on the bottom and top of the package. Holders can be provided in a variety of geometries and materials, depending upon the nature of the application. Further, multiple holders with signal conduits can be provided in a single package to provide for more complex interconnect configuration demands in, for example, system-in-a-package applications.02-28-2013
20130049218SEMICONDUCTOR DEVICE PACKAGING HAVING PRE-ENCAPSULATION THROUGH VIA FORMATION - A method for forming signal conduits before encapsulation for incorporation as through vias in a semiconductor device package is provided. One or more signal conduits are formed through photolithography and metal deposition on a metal film or substrate. After removing photoresistive material, the semiconductor device package is built by encapsulating the signal conduits along with any semiconductor die and other parts of the package. The ends of the signal conduits are exposed and the signal conduits can then be used as through vias, providing signal-bearing pathways between interconnects or contacts on the bottom and top of the package, and electrical contacts of the semiconductor die. Using this method, signal conduits can be provided in a variety of geometric placings in the semiconductor device package. A semiconductor device package including the signal conduits made from the above method is also provided.02-28-2013
20130127030SEMICONDUCTOR DEVICE PACKAGING HAVING SUBSTRATE WITH PRE-ENCAPSULATION THROUGH VIA FORMATION - A method for forming through vias in a semiconductor device package prior to package encapsulation is provided. One or more signal conduits are formed through photolithography and metal deposition on a printed circuit substrate having interconnect pads. After removing photoresistive material, the semiconductor device package is built by encapsulating the signal conduits along with any semiconductor die, wire bonding, and other parts of the package. Free ends of each signal conduit are exposed and the signal conduits are used as through vias to provide signal-bearing pathways between connections from a top-mounted package to a printed circuit substrate interconnect and electrical contacts of the semiconductor die or package contacts. Using this method, signal conduits can be provided in a variety of geometric placings on the printed circuit substrate for inclusion in a semiconductor device package. A semiconductor device package incorporating the pre-fabricated through vias is also provided.05-23-2013

Nitin Chhabra, Oviedo, FL US

Patent application numberDescriptionPublished
20090126367SEQUENTIAL COMBUSTION FIRING SYSTEM FOR A FUEL SYSTEM OF A GAS TURBINE ENGINE - A gas turbine combustion system for a turbine engine is disclosed. The gas turbine combustion system may include a plurality of combustor baskets positioned circumferentially about a longitudinal axis of the turbine engine, at least one firing nozzle extending into each of the plurality of combustor baskets and a fuel delivery system in communication with each of the at least one firing nozzles and in communication with at least one fuel source. Each combustor basket may include a fuel flow control device of the fuel delivery system inline with each of the at least one firing nozzles in that combustor basket such that fuel flow to some of the combustor baskets can be shut off while fuel flow to firing nozzles in other combustor baskets remains unobstructed, thereby permitting some combustor baskets to remain non-fired while other combustor baskets are firing to reduce CO emissions.05-21-2009
20100175387Cooling of Turbine Components Using Combustor Shell Air - A turbine engine assembly for a generator including a turbine engine having a compressor section, a combustor section and a turbine section. An air bleed line is in communication with the combustor section for receiving combustor shell air from the combustor section and conveying the combustor shell air as bleed air to a plurality of stages of the turbine section. Bleed air is controlled to flow through the air bleed line when an operating load of the turbine engine assembly is less than a base load of the engine to bypass air exiting the compressor section around a combustor in the combustor section and effect a flow of high pressure combustor shell air to the stages of the turbine section.07-15-2010

Parminder Chhabra US

Patent application numberDescriptionPublished
20110191418METHOD FOR DOWNLOADING SEGMENTS OF A VIDEO FILE IN A PEER-TO-PEER NETWORK - Method for downloading segments of a video file in a peer to peer network which comprises requesting to create new neighbourhood lists according to a health parameter which indicates availability of video segments among neighbors. Scheduling methods for the upload and download schedulers which work in synergy with the aforementioned features are also disclosed.08-04-2011

Preeti Chhabra, Waynesboro, VA US

Patent application numberDescriptionPublished
20150265704IGM THERAPY IN PREVENTION OF ONSET, PROGRESSION, AND RECURRENCE OF AUTOIMMUNE TYPE 1 DIABETES - The therapeutic potential of polyclonal serum naturally occurring IgM (nIgM) administration in preventing the onset and progression of autoimmune type 1 diabetes and in promoting graft survival following islet allotransplantation has been investigated. nIgM therapy prevents both, onset and progression of diabetes and promotes islet graft survival.09-24-2015

Preeti Chhabra, Atlanta, GA US

Patent application numberDescriptionPublished
20140315750SELECTIVE DETECTION OF NOROVIRUS - A process for detecting norovirus nucleic acid in a sample is provided including producing an amplification product by amplifying a norovirus nucleotide sequence using a forward primer of SEQ ID NO: 1, 4, or 10 and a reverse primer of SEQ ID NO: 2, 5, or 11, and detecting the amplification product to detect norovirus in the sample. Also provided are reagents and methods for detecting and distinguishing GI or Gil norovirus from other infectious agents. A kit is provided for detecting and quantifying norovirus in a sample.10-23-2014

Puneet Chhabra, San Francisco, CA US

Patent application numberDescriptionPublished
20140179438APPARATUS AND METHOD WITH PHYSICAL LOCATION CHECK-IN THAT TRIGGERS A STATUS CHANGE IN A VIRTUAL GAME - A computer readable storage medium includes executable instructions to receive a check-in indication from a physical location with a corresponding virtual location in a virtual game. An attribute in the virtual game is altered based upon the check-in indication. The attribute may be earned points for a user, a virtual object earned by a user or an enhanced popularity measure for the virtual location.06-26-2014

Puneet Chhabra, Mountain View, CA US

Patent application numberDescriptionPublished
20120196682Apparatus and Method with Physical Location Check-in that Triggers a Status Change in a Virtual Game - A computer readable storage medium includes executable instructions to receive a check-in indication from a physical location with a corresponding virtual location in a virtual game. An attribute in the virtual game is altered based upon the check-in indication. The attribute may be earned points for a user, a virtual object earned by a user or an enhanced popularity measure for the virtual location.08-02-2012

Rajeev Chhabra, Mason, OH US

Patent application numberDescriptionPublished
20090039564PROCESS AND APPARATUS FOR FORMING UNIFORM NANOFIBER SUBSTRATES - The present invention is directed to a method and apparatus for making nanofiber webs, wherein a source of process air is utilized to affect the spray pattern and quality of fibrillated material expressed from a die assembly including a multi-fluid opening. Appropriately, the aforementioned process air is defined herein as an alternate or ancillary air source apart from primary process air, which primary air is simultaneously supplied with the molten polymeric material to the fiber forming multi-fluid opening. The ancillary air source of the invention is further distinct from secondary air, which is also known in the art as quenching air. The ancillary air can be described as a continuous fluid curtain of shielding or shaping air.02-12-2009
20100120314APPARATUS FOR PRODUCING SUB-MICRON FIBERS, AND NONWOVENS AND ARTICLES CONTAINING SAME - An apparatus for producing sub-micron fibers, and more specifically an apparatus for effecting formation of sub-micron fibers by fibrillation of polymer films, and nonwoven materials and articles incorporating them.05-13-2010
20110147301NONWOVENS AND ARTICLES CONTAINING SUBMICRON FIBERS - Nonwoven web products containing sub-micron fibers, and more specifically nonwoven web products having sub-micron fibers formed by fibrillation of polymer films, and nonwoven materials and articles incorporating them, and methods of producing these products.06-23-2011
20110196325Absorbent Article with Containment Barrier - The present disclosure, in part, relates generally to an absorbent article to be worn about the lower torso. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs is comprised of a web of material. The web of material has a low surface tension fluid strikethrough time of at least about 19 seconds, and an air permeability of at least about 20 m08-11-2011
20110196327Web Material(s) for Absorbent Articles - The present disclosure, in part, relates generally to an absorbent article to be worn about the lower torso. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs is formed of a web of material. The web of material comprises a first nonwoven component layer comprising fibers having an average diameter in the range of about 8 microns to about 30 microns, a second nonwoven component layer comprising fibers having an average diameter of less than about 1 micron, and a third nonwoven component layer comprising fibers having an average diameter in the range of about 8 microns to about 30 microns. The second nonwoven component layer is disposed intermediate the first nonwoven component layer and the third nonwoven component layer.08-11-2011
20110196332Absorbent Article with Bonded Web Material - An absorbent article to be worn the lower torso is provided. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs comprises a web of material. The web of material comprises a first nonwoven component layer, and a second nonwoven component layer. Each of the longitudinal barrier cuffs comprises a longitudinal zone of attachment where each of the longitudinal barrier cuff attaches to the chassis, a longitudinal free edge, and a plurality of mechanical bonds disposed between the longitudinal zone of attachment and the free edge. The plurality of mechanical bonds attach one of a first portion of the web of material to a second portion of the web of material, and the web of material to a portion of the absorbent article.08-11-2011
20110275269Fibers, Nonwovens and Articles Containing Nanofibers Produced from Broad Molecular Weight Distribution Polymers - The present invention is directed to articles comprising nanofibers. The nanofibers, having a diameter of less than 1 micron, may comprise a significant number of the fibers in one layer of the web contained by the article. Preferably, the nanofibers are produced in a melt film fibrillation process. The articles include diapers, training pants, adult incontinence pads, catamenials products such as feminine care pads and pantiliners, tampons, personal cleansing articles, personal care articles, and personal care wipes including baby wipes, facial wipes, and feminine wipes.11-10-2011
20120021026Dissolvable Fibrous Web Structure Article Comprising Active Agents - The personal care compositions of the present invention are in the form of an Article comprising a dissolvable fibrous web structure. The fibers of the dissolvable fibrous web structure comprise a surfactant; a water soluble polymeric structurant; and a plasticizer. Additionally the ratio of the water soluble water soluble polymeric structurant to the active agent in the fiber is 3.5 or less.01-26-2012
20120150135Absorbent Article With Containment Barrier - An absorbent article comprising a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each longitudinal cuff is formed of a web of material having first and second opposing surfaces and comprising a nonwoven component layer comprising fibers having a number-average diameter of less than about 1 micron, a mass-average diameter of less than about 1.5 microns, and a ratio of the mass-average diameter to the number-average diameter less than about 2. The absorbent article further comprises a hydrophobic coating disposed on at least one surface of the web of material.06-14-2012
20120172831Methods of Delivering a Health Care Active by Administering Personal Health Care Articles Comprising a Filament - A method of delivering a health care active having the steps of administering to a mammal in need of a health benefit or a treatment for a health condition a personal health care article and consuming the article. The article contains one or more filaments that contain a backbone material, a health care active and optionally aesthetic agents, extensional aids, plasticizers, and crosslinking agents.07-05-2012
20120273986PROCESS FOR PRODUCING NONWOVENS AND ARTICLES CONTAINING SUBMICRON FIBERS - Processes for producing nonwoven web products containing sub-micron fibers are provided, and more specifically processes for producing nonwoven web products having sub-micron fibers formed by fibrillation of polymer films are provided.11-01-2012
20130004757ARTICLES CONTAINING NANOFIBERS PRODUCED FROM LOW MELT FLOW RATE POLYMERS - The present invention is directed to hygiene articles comprising nanofibers. The nanofibers are made from a melt film fibrillation process with a polymer composition having a melt flow rate of less than about 400 decigram per minute. The nanofibers, having a diameter of less than 1 micron, must comprise a significant number of the fibers in one layer of the web contained by the hygiene article. The hygiene articles include diapers, training pants, adult incontinence pads, catamenials products such as feminine care pads and pantiliners, tampons, personal cleansing articles, personal care articles, and personal care wipes including baby wipes, facial wipes, and feminine wipes.01-03-2013
20130023836Hygiene Articles Containing Nanofibers - A method of making a nonwoven web comprising nanofibers that are made by a melt film fibrillation process is disclosed. The nanofibers have a diameter of less than 1 micron, and comprise a significant number of the fibers in one layer of the web. The process generally includes the steps of providing a polymeric melt, utilizing a central fluid stream to form an elongated hollow polymeric film tube, and using this and/or other fluid streams to form multiple nanofibers from the hollow tube.01-24-2013
20130147080Articles Containing Nanofibers Produced from Low Melt Flow Rate Polymers - The present invention is directed to hygiene articles comprising nanofibers. The nanofibers are made from a melt film fibrillation process with a polymer composition having a melt flow rate of less than about 400 decigram per minute. The nanofibers, having a diameter of less than 1 micron, must comprise a significant number of the fibers in one layer of the web contained by the hygiene article. The hygiene articles include diapers, training pants, adult incontinence pads, catamenials products such as feminine care pads and pantiliners, tampons, personal cleansing articles, personal care articles, and personal care wipes including baby wipes, facial wipes, and feminine wipes.06-13-2013
20130253017Methods of Delivering a Health Care Active by Administering Personal Health Care Articles Comprising a Filmament - A method of delivering a health care active having the steps of administering to a mammal in need of a health benefit or a treatment for a health condition a personal health care article and consuming the article. The article contains one or more filaments that contain a backbone material, a health care active and optionally aesthetic agents, extensional aids, plasticizers, and crosslinking agents.09-26-2013
20140052087Web Material(s) For Absorbent Articles - The present disclosure, in part, relates generally to an absorbent article to be worn about the lower torso. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs is formed of a web of material. The web of material comprises a first nonwoven component layer comprising fibers having an average diameter in the range of about 8 microns to about 30 microns, a second nonwoven component layer comprising fibers having an average diameter of less than about 1 micron, and a third nonwoven component layer comprising fibers having an average diameter in the range of about 8 microns to about 30 microns. The second nonwoven component layer is disposed intermediate the first nonwoven component layer and the third nonwoven component layer.02-20-2014
20140249498ABSORBENT ARTICLE WITH BONDED WEB MATERIAL - An absorbent article to be worn the lower torso is provided. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs comprises a web of material. The web of material comprises a first nonwoven component layer, and a second nonwoven component layer. Each of the longitudinal barrier cuffs comprises a longitudinal zone of attachment where each of the longitudinal barrier cuff attaches to the chassis, a longitudinal free edge, and a plurality of mechanical bonds disposed between the longitudinal zone of attachment and the free edge. The plurality of mechanical bonds attach one of a first portion of the web of material to a second portion of the web of material, and the web of material to a portion of the absorbent article.09-04-2014
20140329428DISSOLVABLE FIBROUS WEB STRUCTURE ARTICLE COMPRISING ACTIVE AGENTS - The personal care compositions of the present invention are in the form of an Article comprising a dissolvable fibrous web structure. The fibers of the dissolvable fibrous web structure comprise a surfactant; a water soluble polymeric structurant; and a plasticizer. Additionally the ratio of the water soluble water soluble polymeric structurant to the active agent in the fiber is 3.5 or less.11-06-2014
20150038930ABSORBENT ARTICLE WITH CONTAINMENT BARRIER - An absorbent article to be worn about the lower torso, the absorbent article comprising a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each longitudinal cuff is formed of a web of material, the web of material having first and second opposing surfaces. The web of material comprises a nonwoven component layer comprising fibers having a number-average diameter of less than about 1 micron, a mass-average diameter of less than about 1.5 microns, and a ratio of the mass-average diameter to the number-average diameter less than about 2. The absorbent article further comprises a hydrophobic coating disposed on at least one surface of the web of material such that a coated web of material is formed, the hydrophobic surface coating comprising a solventless, multicomponent silicone composition including at least two silicone polymers and being substantially free of aminosilicones.02-05-2015
20150342800Hygiene Articles Containing Nanofibers - A hygiene article including a nonwoven web having nanofibers. The hygiene articles include diapers, training pants, adult incontinence pads, catamenials products, tampons, personal cleansing articles, and personal care articles. The nanofiber webs can be used as a barrier, wipe, or absorbent material. Particularly, the nanofiber web is used in a diaper as a barrier-on-core, outercover, and/or leg cuff. It may also be used as a wipe.12-03-2015

Patent applications by Rajeev Chhabra, Mason, OH US

Rishi Chhabra, San Jose, CA US

Patent application numberDescriptionPublished
20130124273Systems and Methods for Customer Loyalty Program - As a customer conducts qualifying transactions with a participating merchant within a group of merchants, the customer accumulates reward points which can be redeemed at any participating merchant within the group at the time of redemption. A promotion/award determination engine and associated database track the points. A redemption engine is coupled to the database for the redemption of the points.05-16-2013

Ruchir Chhabra, Austin, TX US

Patent application numberDescriptionPublished
20100199077AUTHENTICATED DEBUG ACCESS FOR FIELD RETURNS - Under the direction of a first party, an integrated circuit (IC) device is configured to temporarily enable access to a debug interface of the IC device via authentication of the first party by a challenge/response process using a key of the IC device and a challenge value generated at the IC device. The first party then may conduct a software evaluation of the IC device via the debug interface. In response to failing to identify an issue with the IC device from the software evaluation, the first party can permanently enable open access to the debug interface while authenticated and provide the IC device to a second party. Under the direction of the second party, a hardware evaluation of the IC device is conducted via the debug interface that was permanently opened by the first party.08-05-2010

Shalendra Chhabra, Kirkland, WA US

Patent application numberDescriptionPublished
20090265178Referral Lists for Tracking Distributed Content - Various embodiments described above can enable referral lists to be used in connection with distributed content to protect a referral infrastructure that is used with such content. In at least some embodiments, referral lists are protected using digital rights management (DRM) techniques. The DRM techniques can be used for a number of purposes including securely establishing a referring consumer, securely maintaining a chain of referring entities through distribution tracking, and maintaining control over the referral lists associated with distributed content. In at least some embodiments, DRM techniques are utilized to protect referral lists that are used in multi-level marketing networks.10-22-2009
20090271319Embedded Licenses for Content - In accordance with one or more aspects, a license for content is retrieved, the license having been previously embedded in the content. A requested action is allowed to be performed with the content only if a standalone license, or both a leaf license and a root license, indicate that the action with the content is permissible. Leaf licenses and/or standalone licenses can be embedded by a source of the content and/or by a target device that receives the content. Additionally, licenses can include one or more rules indicating where a target device that receives the content is to store the licenses.10-29-2009

Shivrat Chhabra, Houston, TX US

Patent application numberDescriptionPublished
20150362113SYSTEMS AND METHODS UTILIZING A GROOVELESS FLUID END FOR HIGH PRESSURE PUMPING - Embodiments disclosed herein describe systems and methods for a spring retainer configuration without suction bore grooves, wherein the spring retainer may be secured in place via a keeper. By eliminating the grooves, embodiments may reduce the surface area of the bore intersection, which may slow the rate of material erosion. Accordingly, embodiments may extend the life of a fluid end in high pressure environments.12-17-2015

Siddhartha Chhabra, Hillsboro, OR US

Patent application numberDescriptionPublished
20140040632LOW-OVERHEAD CRYPTOGRAPHIC METHOD AND APPARATUS FOR PROVIDING MEMORY CONFIDENTIALITY, INTEGRITY AND REPLAY PROTECTION - A method and system to provide a low-overhead cryptographic scheme that affords memory confidentiality, integrity and replay-protection by removing the critical read-after-write dependency between the various levels of the cryptographic tree. In one embodiment of the invention, the cryptographic processing of a child node can be pipelined with that of the parent nodes. This parallelization provided by the invention results in an efficient utilization of the cryptographic pipeline, enabling significantly lower performance overheads.02-06-2014
20140096068DEVICE AND METHOD FOR SECURE USER INTERFACE GESTURE PROCESSING USING PROCESSOR GRAPHICS - A device and method for securely rendering content on a gesture-enabled computing device includes initializing a secure execution environment on a processor graphics of the computing device. The computing device transfers view rendering code and associated state data to the secure execution environment. An initial view of the content is rendered by executing the view rendering code in the secure execution environment. A gesture is recognized, and an updated view of the content is rendered in the secure execution environment in response to the gesture. The gesture may include a touch gesture recognized on a touch screen, or a physical gesture of the user recognized by a camera. After the updated view of the content is rendered, the main processor of the computing device may receive updated view data from the secure execution environment.04-03-2014
20140101461PARALLELIZED COUNTER TREE WALK FOR LOW OVERHEAD MEMORY REPLAY PROTECTION - A processor includes a memory encryption engine that provides replay and confidentiality protections to a memory region. The memory encryption engine performs low-overhead parallelized tree walks along a counter tree structure. The memory encryption engine upon receiving an incoming read request for the protected memory region, performs a dependency check operation to identify dependency between the incoming read request and an in-process request and to remove the dependency when the in-process request is a read request that is not currently suspended.04-10-2014
20140157404VIRTUALIZING A HARDWARE MONOTONIC COUNTER - Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed.06-05-2014
20140157410Secure Environment for Graphics Processing Units - In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the workloads from malware running on the graphics processing unit but also protects those workloads from malware running on the central processing unit. In addition, the trust framework may facilitate proof of secure execution by measuring the code and data structures used to execute the workload. If a part of the trusted computing base of this framework or protected execution environment is compromised, that part can be patched remotely and the patching can be proven remotely throughout attestation in some embodiments.06-05-2014
20140173756PLATFORM-HARDENED DIGITAL RIGHTS MANAGEMENT KEY PROVISIONING - Embodiments of an invention for platform-hardened digital rights management key provisioning are disclosed. In one embodiment, a processor includes an execution unit to execute one or more instructions to create a secure enclave in which to run an application to receive digital rights management information from a provisioning server in response to authentication of the application by a verification server.06-19-2014
20140208109METHOD AND SYSTEM FOR PROTECTING MEMORY INFORMATION IN A PLATFORM - A method and system to provide an effective, scalable and yet low-cost solution for Confidentiality, Integrity and Replay protection for sensitive information stored in a memory and prevent an attacker from observing and/or modifying the state of the system. In one embodiment of the invention, the system has strong hardware protection for its memory contents via XTS-tweak mode of encryption where the tweak is derived based on “Global and Local Counters”. This scheme offers to enable die-area efficient Replay protection for any sized memory by allowing multiple counter levels and facilitates using small counter-sizes to derive the “tweak” used in the XTS encryption without sacrificing cryptographic strength.07-24-2014
20140267332Secure Rendering of Display Surfaces - A protected graphics module can send its output to a display engine securely. Secure communications with the display can provide a level of confidentiality of content generated by protected graphics modules against software and hardware attacks.09-18-2014
20140337983Entry/Exit Architecture for Protected Device Modules - The entry/exit architecture may be a critical component of a protection framework using a secure enclaves-like trust framework for coprocessors. The entry/exit architecture describes steps that may be used to switch securely into a trusted execution environment (entry architecture) and out of the trusted execution environment (exit architecture), at the same time preventing any secure information from leaking to an untrusted environment.11-13-2014
20150086012SECURE VIDEO OUPUT PATH - Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected memory; and a processing core communicatively coupled to the architecturally protected memory, the processing core comprising a processing logic configured to implement an architecturally-protected execution environment by performing at least one of: executing instructions residing in the architecturally protected memory and preventing an unauthorized access to the architecturally protected memory; wherein the processing logic is further configured to provide a secure video output path by generating an output surface bitmap encrypted with a first encryption key and storing an encrypted first encryption key in an external memory, wherein the encrypted first encryption key is produced by encrypting the first encryption key with a second encryption key.03-26-2015
20150089173SECURE MEMORY REPARTITIONING - Secure memory repartitioning technologies are described. A processor includes a processor core and a memory controller coupled between the processor core and main memory. The main memory includes a memory range including a section of convertible pages are convertible to secure pages or non-secure pages. The processor core, in response to a page conversion instruction, is to determine from the instruction a convertible page in the memory range to be converted and convert the convertible page to be at least one of a secure page or a non-secure page. The memory range may also include a hardware reserved section are convertible in response to a section conversion instruction.03-26-2015
20150178481PLATFORM-HARDENED DIGITAL RIGHTS MANAGEMENT KEY PROVISIONING - Embodiments of an invention for platform-hardened digital rights management key provisioning are disclosed. In one embodiment, a processor includes an execution unit to execute one or more instructions to create a secure enclave in which to run an application to receive digital rights management information from a provisioning server in response to authentication of the application by a verification server.06-25-2015
20150180657TECHNIQUES FOR ENFORCING A DEPTH ORDER POLICY FOR GRAPHICS IN A DISPLAY SCENE - Various embodiments are generally directed an apparatus and method for processing an encrypted graphic with a decryption key associated with a depth order policy including a depth position of a display scene, generating a graphic from the encrypted graphic when the encrypted graphic is successfully decrypted using the decryption key and assigning the graphic to a plane at the depth position of the display scene when the encrypted graphic is successfully decrypted.06-25-2015
20150186295Bridging Circuitry Between A Memory Controller And Request Agents In A System Having Multiple System Memory Protection Schemes - A processor is described that includes one or more processing cores. The processor includes a memory controller to interface with a system memory having a protected region and a non protected region. The processor includes a protection engine to protect against active and passive attacks. The processor includes an encryption/decryption engine to protect against passive attacks. The protection engine includes bridge circuitry coupled between the memory controller and the one or more processing cores. The bridge circuitry is also coupled to the protection engine and the encryption/decryption engine. The bridge circuitry is to route first requests directed to the protected region to the protection engine and to route second requests directed to the non protected region to the encryption/decryption engine.07-02-2015
20150278512VIRTUALIZATION BASED INTRA-BLOCK WORKLOAD ISOLATION - Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package.10-01-2015
20150278514Entry/Exit Architecture for Protected Device Modules - The entry/exit architecture may be a critical component of a protection framework using a secure enclaves-like trust framework for coprocessors. The entry/exit architecture describes steps that may be used to switch securely into a trusted execution environment (entry architecture) and out of the trusted execution environment (exit architecture), at the same time preventing any secure information from leaking to an untrusted environment.10-01-2015

Swapnil R. Chhabra, Oakland, CA US

Patent application numberDescriptionPublished
20140154752GLYCOSIDE HYDROLASES HAVING MULTIPLE HYDROLASE ACTIVITIES - Glycoside hydrolases having at least two different hydrolytic activities are provided. In one embodiment, an isolated recombinant hydrolase having at least two activities selected from a group including asparagine derivatives, glutamine derivatives, and histidine derivatives is provided. Further, a method of generating free sugars from a mixture comprising asparagine derivatives, glutamine derivatives, and histidine derivatives is provided.06-05-2014
20140242649Hybrid organic-inorganic system for producing biofuels - The present invention provides for a system for converting CO08-28-2014

Vishal Chhabra, Fishkill, NY US

Patent application numberDescriptionPublished
20140008697Siloxane Compositions Including Titanium Dioxide Nanoparticles Suitable For Forming Encapsulants - A composition includes an organopolysiloxane component (A) comprising at least one of a disiloxane, a trisiloxane, and a tetrasiloxane, and has an average of at least two alkenyl groups per molecule. The composition further includes an organohydrogensiloxane component (B) having an average of at least two silicon-bonded hydrogen atoms per molecule. Components (A) and (B) each independently have at least one of an alkyl group and an aryl group and each independently have a number average molecular weight less than or equal to 1500 (g/mole). The composition yet further includes a catalytic amount of a hydrosilylation catalyst component (C), and titanium dioxide (TiO01-09-2014
20140128307CLEANING COMPOSITION AND PROCESS FOR CLEANING SEMICONDUCTOR DEVICES AND/OR TOOLING DURING MANUFACTURING THEREOF - Cleaning solutions and processes for cleaning semiconductor devices or semiconductor tooling during manufacture thereof generally include contacting the semiconductor devices or semiconductor tooling with an acidic aqueous cleaning solution free of a fluorine containing compound, the acidic aqueous cleaning solution including at least one antioxidant and at least one non-oxidizing acid.05-08-2014
20150024989CLEANING COMPOSITION AND PROCESS FOR CLEANING SEMICONDUCTOR DEVICES AND/OR TOOLING DURING MANUFACTURING THEREOF - Cleaning solutions and processes for cleaning semiconductor devices or semiconductor tooling during manufacture thereof generally include contacting the semiconductor devices or semiconductor tooling with an acidic aqueous cleaning solution free of a fluorine containing compound, the acidic aqueous cleaning solution including at least one antioxidant and at least one non-oxidizing acid.01-22-2015
20160041471ACIDIFIED CONDUCTIVE WATER FOR DEVELOPER RESIDUE REMOVAL - The present invention relates generally to semiconductor fabrication lithography and, more particularly, to a method and composition for reducing post-development defects and residues that may remain on a photoresist after development of the photoresist without causing substantial damage to the photoresist. The method may include rinsing the photoresist and the semiconductor device with ozonated acidified conductive water composed of a combination of ozone and a gaseous acid dissolved in deionized water.02-11-2016

Patent applications by Vishal Chhabra, Fishkill, NY US

Website © 2016 Advameg, Inc.