Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Desai, WA

Aditi Desai, Redmond, WA US

Patent application numberDescriptionPublished
20130074142SECURING DATA USAGE IN COMPUTING DEVICES - Policies are applied to specific data rather than to an entire computing device that contains the specific data. Access to the specific data is controlled by the policies utilizing various password or other authentication credential requirements, selective data caching, data transmission, temporary data storage, and/or pre-defined conditions under which the specific data is to be erased or rendered inaccessible. Policies may be defined by an administrator and pushed to a mobile computing device, whereat the policies are enforced.03-21-2013
20140379851AGGREGATING CONTENT FROM DIFFERENT CONTENT SOURCES AT A CLOUD SERVICE - A cloud service stores and aggregates content that is obtained from different content sources using different protocols. For example, the content may include electronic messages, calendar information, contacts, social network content, feed data, search results, and the like. The cloud service aggregates content for each user based on the user's configuration settings. The cloud service may perform processing on the aggregated content before it is delivered and displayed to the user on the client device. For example, one or more views may be generated and stored by the cloud service before the view is requested from the client. Changes made to the aggregated content on the client may be synchronized with the content source. Searches may be made across all or a portion of the different content sources that are aggregated for a user.12-25-2014

Ajay Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20090158047HIGH PERFORMANCE SECURE CACHING IN THE MID-TIER - In a multi-tier data server system, data from the first tier is cached in a mid-tier cache of the middle tier. Access control information from the first tier for the data is also cached within the mid-tier cache. Caching the security information in the middle tier allows the middle tier to make access control decisions regarding requests for data made by clients in the outer tier.06-18-2009

Ajay M. Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20080293450Consumption of Items via a User Device - An item-providing system supplies items to a user device for consumption at the user device via communication infrastructure. In one illustrative implementation, the communication infrastructure may rely, in part, on wireless communication. The device may correspond to a book reader device or other type of device.11-27-2008

Anish Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20140075185SECURELY HANDLING SERVER CERTIFICATE ERRORS IN SYNCHRONIZATION COMMUNICATION - An invalid digital certificate can be saved and subsequently compared to an incoming digital certificate when performing a security check. If a subsequently provided digital certificate does not match the saved digital certificate, an error condition can be generated. Because a digital certificate can be invalid for non-malicious reasons, such technologies can be useful for improving software security.03-13-2014
20150078332VOICE CALL CONTINUITY IN HYBRID NETWORKS - Voice call continuity is provided for calls that are carried over a hybrid network infrastructure in which access connections are distributed over loosely coupled network portions including a backend network such as a core VoIP (Voice over Internet Protocol) service network, one or more cellular mobile networks, and a public switched telephone network (“PSTN”). The calls are routed through the core VoIP network regardless of their points of origination or termination in other network portions so that signaling and call context are anchored in the core VoIP network. The conditions under which user equipment operate are continuously monitored so that when a connection is determined to have been unacceptably degraded or is likely to be interrupted, and/or a more optimal connection is available, a handover of the call to another connection is initiated so that call continuity is maintained using the lowest cost connection that provides acceptable call quality.03-19-2015

Anish V. Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20100251338Predictive HTTP Authentication Mode Negotiation - A client system and a server system use a Hypertext Transfer Protocol (HTTP) authentication mode preference header to negotiate an HTTP authentication mode. The client system sends an HTTP request to the server system. In response to the HTTP request, the server system sends an HTTP response to the client system. The HTTP response includes an HTTP authentication mode preference header. The HTTP authentication mode preference header indicates whether a preferred HTTP authentication mode is connection-based HTTP authentication or request-based HTTP authentication. In subsequent HTTP requests to the server system, the client system uses the HTTP authentication mode indicated by the HTTP authentication mode preference header.09-30-2010
20110016220Enabling Peer-To-Peer Content Retrieval in HTTP - Described are embodiments directed to enabling the retrieval of content from a peer-to-peer network. In embodiments, a client requesting content from a server can indicate in an HTTP request that it is capable of retrieving content from a peer-to-peer network. When the server receives the HTTP request it will recognize the indication that the client is capable of retrieving content from a peer-to-peer network and may send content information instead of sending the requested content. The content information allows the client to retrieve the content from the peer-to-peer network.01-20-2011
20120311104ENABLING PEER-TO-PEER CONTENT RETRIEVAL IN HTTP - Described are embodiments directed to enabling the retrieval of content from a peer-to-peer network. In embodiments, a client requesting content from a server can indicate in an HTTP request that it is capable of retrieving content from a peer-to-peer network. When the server receives the HTTP request it will recognize the indication that the client is capable of retrieving content from a peer-to-peer network and may send content information instead of sending the requested content. The content information allows the client to retrieve the content from the peer-to-peer network.12-06-2012
20140047077ENABLING PEER-TO-PEER CONTENT RETRIEVAL IN HTTP - Described are embodiments directed to enabling the retrieval of content from a peer-to-peer network. In embodiments, a client requesting content from a server can indicate in an HTTP request that it is capable of retrieving content from a peer-to-peer network. When the server receives the HTTP request it will recognize the indication that the client is capable of retrieving content from a peer-to-peer network and may send content information instead of sending the requested content. The content information allows the client to retrieve the content from the peer-to-peer network.02-13-2014

Patent applications by Anish V. Desai, Bellevue, WA US

Anu Desai, Gig Harbor, WA US

Patent application numberDescriptionPublished
20080242690Methods and Compositions for Promoting Bone and Joint Health - Methods and compositions that can be used to promote bone and joint health through amelioration, stabilization and repair of damage associated with various pathophysiological conditions are disclosed.10-02-2008
20080248131Protein Kinase Modulation by Hops and Acacia Products - Botanical compounds to modulate kinase activity are disclosed. The compounds and methods disclosed also inhibit expression of COX-2, inhibit synthesis o prostaglandins selectively in target cells, and inhibit inflammatory response selectively. The compositions contain at least one fraction isolated or derived from hops or 10-09-2008
20090155382Methods and Compositions for Heavy Metal Detoxification - Compositions and methods for enhancing heavy metal detoxification are described. The compositions and methods described provide enhanced activity of key detoxification systems including that the induction of phase II detoxification enzymes, such as glutathione S-transferases (GSTs), and NADPH quinone reductase (NQO1) activity.06-18-2009
20100069422METHODS AND COMPOSITIONS FOR PROMOTING BONE AND JOINT HEALTH - Methods and compositions that can be used to promote bone and joint health through amelioration, stabilization and repair of damage associated with various pathophysiological conditions are disclosed.03-18-2010
20100137449SUBSTITUTED 1,3-CYCLOPENTADIONE MULTI-TARGET PROTEIN KINASE MODULATORS OF CANCER, ANGIOGENESIS AND THE INFLAMMATORY PATHWAYS ASSOCIATED THEREWITH - Compounds and methods for multi-targeted protein kinase modulation for angiogenesis, cancer treatment or the inflammatory pathways associated with those conditions are disclosed. The compounds and methods disclosed are based on substituted 1,3-cyclopentadione compounds.06-03-2010
20100222262SUBSTITUTED 1, 3-CYCLOPENTADIONE ATTENUATED ENDOTHELIAL INFLAMMATION AND ENDOTHELIAL-MONOCYTE INTERACTIONS - Compositions and methods for reducing cardiovascular risk utilizing substituted 1,3-cyclopentadione compounds are described.09-02-2010
20110021637XANTHOHUMOL AND TETRAHYDRO-ISOALPHA ACID BASED PROTEIN KINASE MODULATION CANCER TREATMENT - Compounds and methods for protein kinase modulation for cancer treatment are disclosed. The compounds and methods disclosed are based on xanthohumol or isoxantohumol, or tetrahydro-isoalpha acids commonly found in hops.01-27-2011
20120189721METHODS AND COMPOSITIONS FOR HEAVY METAL DETOXIFICATION - Compositions and methods for enhancing heavy metal detoxification are described. The compositions and methods described provide enhanced activity of key detoxification systems including that the induction of phase II detoxification enzymes, such as glutathione S-transferases (GSTs), and NADPH quinone reductase (NQO1) activity.07-26-2012
20130337092PHYTONUTRIENT COMPOSITIONS AND METHODS OF USE - Phytonutrient based compositions and methods of using the same for preventing, reducing, or treating genetic damage induced by environmental toxins are disclosed. Additionally, said compositions and methods are used to reduce oxidized low density lipoproteins (OxLDL), myeloperoxidase (MPO), and plasminogen activator inhibitor-1 (PAI-1).12-19-2013

Patent applications by Anu Desai, Gig Harbor, WA US

Anuradha Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20150119461TETRAHYDRO-ISOHUMULONE DERIVATIVES, METHODS OF MAKING AND USING - The present application provides novel tetrahydro-isohumulone (THIAA) derivatives and substantially enantiomerically pure compositions and pharmaceutical formulations thereof. The application further provides methods of using the disclosed compounds and compositions to activate PPARγ, inhibit inflammation, and treat conditions associated with inflammation and conditions responsive to PPARγ modulation such as diabetes.04-30-2015

Anuradha Desai, Gig Harbor, WA US

Patent application numberDescriptionPublished
20120108671CIS 3,4-DIHYDROXY-2-(3-METHYLBUTANOYL)-5-(3-METHYLBUTYL)-4-(4-METHYLPENTAN- OYL)CYCLOPENT-2-EN-1-ONE DERIVATIVES, SUBSTANTIALLY ENANTIOMERICALLY PURE COMPOSITIONS AND METHODS - The present application provides cis 3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one derivatives and substantially enantiomerically pure compositions thereof. These derivatives include (+)-(4S,5R)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, (−)-(4R,5S)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, and salts and crystals thereof. The application further provides methods of using the disclosed compounds and compositions to activate PPARγ, activate GPR120, inhibit inflammation, and treat conditions responsive to PPARγ modulation, conditions responsive to GPR120 modulation, and metabolic disturbances such as diabetes.05-03-2012
20130018105CIS, 3,4-DIHYDROXY-2-(3-METHYLBUTANOYL)-5-(3-METHYLBUTYL)-4-(4-METHYLPENTA- NOYL)CYCLOPENT-2-EN-1-ONE DERIVATIVES, SUBSTANTIALLY ENANTIOMERICALLY PURE COMPOSITIONS AND METHODS - The present application provides cis 3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one derivatives and substantially enantiomerically pure compositions thereof. These derivatives include (+)-(4S,5R)—3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, (−)-(4R,5S)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, and salts and crystals thereof. The application further provides methods of using the disclosed compounds and compositions to activate PPARγ, activate GPR120, inhibit inflammation, and treat conditions responsive to PPARγ modulation, conditions responsive to GPR120 modulation, and metabolic disturbances such as diabetes.01-17-2013
20130217781CIS 3,4-DIHYDROXY-2-(3-METHYLBUTANOYL)-5-(3-METHYLBUTYL)-4-(4-METHYLPENTAN- OYL)CYCLOPENT-2-EN-1-ONE DERIVATIVES, SUBSTANTIALLY ENANTIOMERICALLY PURE COMPOSITIONS AND METHODS - The present application provides cis 3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one derivatives and substantially enantiomerically pure compositions thereof. These derivatives include (+)-(4S,5R)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, (−)-(4R,5S)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, and salts and crystals thereof. The application further provides methods of using the disclosed compounds and compositions to activate PPARγ, activate GPR120, inhibit inflammation, and treat conditions responsive to PPARγ modulation, conditions responsive to GPR120 modulation, and metabolic disturbances such as diabetes.08-22-2013

Atulkumar Desai, Sammamish, WA US

Patent application numberDescriptionPublished
20140164220PAYMENT INSTRUMENT SELECTION - Example apparatus and methods concern helping a shopper figure out which payment instrument (e.g., card with frequent flyer miles, card with discount, card with hotel points, card with cash back, card with insurance) to use for a particular purchase. Example apparatus and methods identify payment options available for a purchase and identify incentives associated with the payment options. Example apparatus and methods compare the benefits (e.g., miles, points, discount, cash back) that will be provided to the purchaser for different payment options. Example apparatus and methods may then produce an ordered presentation of payment options to a consumer or to a purchase process. Example apparatus and methods may facilitate a consumer increasing the utility of participation in affinity programs, may facilitate a consumer achieving a reward status, may facilitate a consumer achieving a desired discount, or may generally improve the consumer's shopping experience.06-12-2014

Atulkumar Desai, Sammamishi, WA US

Patent application numberDescriptionPublished
20130211814ANALYZING RESTAURANT MENUS IN VIEW OF CONSUMER PREFERENCES - A system and method are described for analyzing a menu. In one embodiment, a mobile device can obtain a digital version of a restaurant menu. A list of food criteria can be stored on the mobile device and tailored to a particular user of the mobile device. The restaurant menu can then be filtered using the stored list of food criteria to display a reduced version of the restaurant menu with items that conflict with the food criteria removed. In another embodiment, the digital version of the menu can be translated. For example, a destination language can be based on a language setting in the mobile device. A source language can either be entered by the user, determined automatically by comparing words in the menu itself against dictionaries in different languages, or by using geographic location of the restaurant.08-15-2013

Mitesh Desai, Sammamish, WA US

Patent application numberDescriptionPublished
20140348073ALLOCATION OF SHARED RESOURCES FOR VIRTUALIZED NETWORKING - Technology for allocating network adapter resources such as air interface time and queue space amongst multiple virtual network stations or other virtual adapters is disclosed. As one example, the resource allocation may be based on analysis of the relative latency, jitter, or bandwidth considerations for applications communicating via each of the multiple virtual adapters. The resource allocation may also be based on how efficiently each of the virtual adapters utilized previously allocated resources.11-27-2014
20140359160MANAGEMENT OF MULTILEVEL QUEUES FOR SHARED NETWORK ADAPTERS - Technology for managing queuing resources of a shared network adapter is disclosed. The technology includes selectively transferring data from data transmission sources to a queue of the shared network adapter based on status indications from the shared network adapter regarding availability of queuing resources at the shared network adapter. In addition, the technology also includes features for selectively controlling transfer rates of data to the shared network adapter from applications, virtual network stations, other virtual adapters, or other data transmission sources. As one example, this selective control is based on how efficiently data from these data transmission sources are transmitted from the shared network adapter.12-04-2014
20140379883NETWORK MODE CONFLICT RESOLUTION - Technology for managing operational modes of a network adapter is disclosed. The technology includes features for selectively preempting (e.g., canceling, suspending, deferring, pausing, changing to a “no-op” state, changing to a passive state, or otherwise deprioritizing) execution for a current operational mode of the network adapter, executing a requested network control operation, and optionally restoring the preempted operational mode. The operational mode may be selectively preempted based on priority information associated with the current operational mode and the requested network control operation.12-25-2014
20140379884PRIORITIZATION OF NETWORK CONTROL OPERATIONS - Technology for prioritizing and executing network control operations is disclosed. The technology includes prioritizing requested network control operations against other network control operations and executing network control operations based on this prioritization. The prioritization may be based on priority information and classes with which the network control operations are associated. The classes may be based on expected durations of time for executing the network control operations. The technology also includes prioritizing and executing network control operations in a virtualized networking system.12-25-2014

Mitesh K. Desai, Sammamish, WA US

Patent application numberDescriptionPublished
20130067065DETECTING DEVICE PRESENCE FOR A LAYER 3 CONNECTION USING LAYER 2 DISCOVERY INFORMATION - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.03-14-2013
20130067068EVENT-DRIVEN DETECTION OF DEVICE PRESENCE FOR LAYER 3 SERVICES USING LAYER 2 DISCOVERY INFORMATION - Techniques for detecting presence of a remote device at Layer 2 in response to an indication of an attempt to use the device and without maintaining a Layer 3 connection to the device. The techniques allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection to the remote device to provide services to a user. The Layer 3 connection and underlying Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated when the Layer 3 connection is not actively used. Once use of the remote device is desired, its presence may be detected using a Layer 2 device discovery mechanism and the Layer 2 and Layer 3 connections to the device may be reestablished. Services provided at Layer 3, such as steaming data, may then be performed over the reestablished Layer 3 connection.03-14-2013
20130232253PEER-TO-PEER DISCOVERY - A wireless device that discovers other wireless devices for the formation of a peer-to-peer connection may perform a scan that is limited in duration and power consumption. The scan nonetheless is highly likely to discover a device, if a discoverable device exists. In addition, the scan may be performed in compliance with parameters of a peer-to-protocol such that the scan may be readily implemented in a wireless device, in some embodiments even as a firmware upgrade on a wireless network interface card. Parameters of the scan may be adjusted to increase the likelihood that, if the scan completes without discovering a device, no discoverable device exists. The scan may be used in an overall process in which discovery ends or the scan is selectively repeated following an unsuccessful scan, without entering a find phase.09-05-2013
20140126468Determination of Packet Retransmission using Time Threshold - Techniques for determination of packet retransmission using a time threshold are described. In at least some embodiments, information for a packet that is received is compared to information for previously received packets. If the information for the packet matches a previously received packet, a receive time for the packet is compared to a timestamp for the previously received packet to determine if the packet is a retransmission of the previously received packet. In at least some embodiments, packet information associated with different senders can be stored, e.g., to enable packet information comparison for purpose of retransmission detection. An amount of packet information that is stored can be limited to a certain number of senders to control the impact of packet information storage on memory resources.05-08-2014
20140133407CONNECTION INFORMATION FOR INTER-DEVICE WIRELESS DATA COMMUNICATION - Techniques for connection information for inter-device wireless data communication are described. In at least some embodiments, a broker device maintains wireless connection information for various wireless devices. The wireless connection information includes wireless channels at which particular wireless devices can be accessed. The broker device can provide the wireless connection information to various other devices to enable wireless communication with the wireless devices.05-15-2014
20140143629Wireless Access Point Mapping - Techniques for wireless access point mapping are described. In at least some embodiments, various characteristics of a wireless access point are detected. Examples of such characteristics include signal strength for wireless signal transmitted by the wireless access point, identifying information for the wireless access point, data error rates for data transmitted by the wireless access point, and so forth. Characteristics of a wireless access point can be detected at multiple different geographic locations to enable a reception range mapping to be generated for the wireless access point, e.g., for an area in which signal reception for the wireless access point is qualitatively acceptable.05-22-2014
20140289396Detecting Device Presence for a Layer 3 Connection Using Layer 2 Discovery Information - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.09-25-2014

Mitesh K. Desai, Redmond, WA US

Patent application numberDescriptionPublished
20090103481MAINTAINING MULTIPLE, SIMULTANEOUS WIRELESS NETWORK CONNECTIONS USING A SINGLE RADIO - A method and apparatus for managing simultaneous virtual connections with multiple wireless networks. A plurality of ports in a hardware driver may be each associated with a corresponding wireless network and maintain a unique MAC state relative to other ports. Each port may have a corresponding virtual NIC that communicates directly with the radio hardware via a hardware virtualization layer that multiplexes communication between the virtual NICs and the radio hardware. Simultaneous virtual connections may be made with one or more infrastructure networks or adhoc networks, and/or the computer may function as an access point for one or more of the networks.04-23-2009
20090254924OPERATING SYSTEM INTERFACES FOR VIRTUAL WIFI AND SOFTAP CAPABLE DRIVERS - Some embodiments of the invention provide an interface between programmed instructions (e.g., an operating system) and a miniport driver configured to communicate with radio hardware on a computer. The interface may include components operable to invoke various wireless connectivity-related functionality implemented by the radio hardware and/or miniport driver. The functionality may, for example, include a capability whereby the computer may maintain simultaneous connections on a plurality of wireless networks using a single radio, and/or a capability whereby the computer may function as an access point for a wireless network.10-08-2009
20120147268DIRECT CONNECTION WITH SIDE CHANNEL CONTROL - A wireless computer that pairs with a remote audio-video presentation device, such as a television. As a result of the pairing, a communication channel is established for the computer to transmit audio-video content for presentation through that device. Additionally, as part of the pairing, the computer and remote device select a side channel for communication of user commands. The wireless computer may display a user interface through which a user may input commands that control the manner in which the remote audio-video device presents the content. As a result, a user may use the wireless computer as a remote control for the audio-video device, controlling both the content presented and the manner in which it is presented. The side channel may use different frequencies than the channel used to communicate audio-video content, and may use very low power at frequencies in the digital TV spectrum.06-14-2012
20120155643SECURE PROTOCOL FOR PEER-TO-PEER NETWORK - A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.06-21-2012
20120158839WIRELESS NETWORK INTERFACE WITH INFRASTRUCTURE AND DIRECT MODES - An architecture for a computing device to enable the computing device to support peer-to-peer communications using a wireless radio also configured for infrastructure-based communication. The architecture includes a driver for the wireless radio that supports ports for communication in accordance with the peer-to-peer protocol. A port may act as a control port through which action frames that control the formation of a peer-to-peer group may be sent and received. One or more other ports may be used for exchanging data with other devices in the group. Each of these ports may be configured in accordance with its role in the group, such that each port may be configured for operation as a group owner or a client. Additionally, after establishing a group, the control port may be used as a side channel for controlling a device in a group associated with another port.06-21-2012
20120158981FAST JOIN OF PEER TO PEER GROUP WITH POWER SAVING MODE - A wireless peer-to-peer protocol that supports fast and low power joining to an existing group. The protocol may be an extension of a peer-to-peer protocol that supports a sleep state for a device controlling the group. When a device is seeking to join a group at a time when the controlling device is in a sleep state, another device that has information about the controlling device may provide information to the joining device that may then be used by the joining device to more quickly, and using less power, synchronize with the controlling device. The information may include information about a channel used by the controlling device or about timing of availability of the controlling device. The information may also reveal whether the group provides a service being sought by the joining device or may otherwise influence whether the joining device will attempt to join a group.06-21-2012
20120233266PEER-TO-PEER GROUP WITH RENEGOTIATION OF GROUP OWNER - A computing device that selectively renegotiates roles of devices in an existing peer-to-peer group. As the group is formed, the device may negotiate with other devices to select a device to control the group. During operation of the group, a device in the group may initiate a renegotiation that may lead to the selection of an alternative device to control the group. Renegotiation may be triggered by a message containing an information element signifying a request for renegotiation. Such a message may be sent either by the controlling device or other device in the group, and may be sent based on a state of the device. The state may relate to a source of power to the device such that a client that is connected to a source of power or a controlling device that is running low on battery power may request a renegotiation.09-13-2012
20120239755ROAMING GROUPS IN A PEER-TO-PEER NETWORK - A computing device that forms a group in accordance with a peer-to-peer protocol in which a device may be identified based on a credential of a user. The credential may be used to determine a unique identifier for the user such that the same identifier is used on any device operated by the same user. Such an identifier may be used in connection with a peer-to-peer protocol that supports persistent peer-to-peer groups. As a result, the unique identifier for the user may be retained by remote devices that have paired with any device operated by a particular user such that those remote devices may automatically establish a connection with any other device operated by the same user that similarly uses the same unique identifier for the user.09-20-2012
20120290730MASS RE-FORMATION OF GROUPS IN A PEER-TO-PEER NETWORK - A system in which wireless devices form a group in accordance with a peer-to-peer protocol and, at a later time, a device may send an invitation request to trigger the devices tore-form the peer-to-peer group. The invitation request may contain an identifier that is associated with a set of a plurality of devices. Those devices may be related such that they perform a function for which a user would want to use those devices together. The group of devices, for example, may be multimedia devices that receive and present streaming multimedia content or may be human interface devices that collectively act as an interface for a work station incorporating a wireless computing device operated by a user. Requesting that remote devices concurrently re-form a group reduces the time and spectral congestion associated with re-forming the group, particularly when the remote devices may periodically enter a low power state.11-15-2012
20120296986AUTO CONNECT IN PEER-TO-PEER NETWORK - A wireless device that automatically forms a connection to a remote device in accordance with a peer-to-peer protocol. The remote device may be designated as an auto-connect device for the wireless device such that, when the wireless device determines that it is in the vicinity of the auto-connect device, it can re-form a connection to the remote device based on stored information for re-establishing connections among a persistent group of devices, but without any express user input. When a user requests that the wireless device perform a function that involves interaction with an auto-connect device, that function may be performed with the delay associated with forming a connection. Any of multiple techniques may be employed for identifying devices designated as auto-connect devices and for determining when the wireless device and a remote, auto-connect devices are in close proximity.11-22-2012
20120297229AUTO-CONNECT IN A PEER-TO-PEER NETWORK - A wireless device that automatically forms a connection to a remote device in accordance with a peer-to-peer protocol. The remote device may be designated as an auto-connect device for the wireless device such that, when the wireless device determines that it is in the vicinity of the auto-connect device, it can re-form a connection to the remote device based on stored information for re-establishing connections among a persistent group of devices, but without any express user input. When a user requests that the wireless device perform a function that involves interaction with an auto-connect device, that function may be performed with the delay associated with forming a connection. Any of multiple techniques may be employed for identifying devices designated as auto-connect devices and for determining when the wireless device and a remote, auto-connect devices are in close proximity.11-22-2012
20120297306AUTO-CONNECT IN A PEER-TO-PEER NETWORK - A wireless device that automatically forms a connection to a remote device in accordance with a peer-to-peer protocol. The remote device may be designated as an auto-connect device for the wireless device such that, when the wireless device determines that it is in the vicinity of the auto-connect device, it can re-form a connection to the remote device based on stored information for re-establishing connections among a persistent group of devices, but without any express user input. When a user requests that the wireless device perform a function that involves interaction with an auto-connect device, that function may be performed with the delay associated with forming a connection. Any of multiple techniques may be employed for identifying devices designated as auto-connect devices and for determining when the wireless device and a remote, auto-connect devices are in close proximity.11-22-2012
20120322368SIMPLE PEER-TO-PEER NETWORK FORMATION - Wireless devices that support bootstrapping of a peer-to-peer connection. The wireless devices may use an infrastructure mode connection to exchange security information, such as a PIN, used in establishing the peer-to-peer connection. This security information may be encrypted in accordance with a security protocol used by the access point and then may be applied in a security protocol used to establish a peer-to-peer connection. Such a bootstrapping capability supports operating scenarios in which devices that are communicating over an infrastructure network encounter an operation that requires transfer of large amounts of data and automatically transition to a peer-to-peer connection that provides better performance. With these techniques, a computing device may automatically connect to a display device and stream audio/video data to the display.12-20-2012

Patent applications by Mitesh K. Desai, Redmond, WA US

Natasha Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20090192845INTEGRATED REAL TIME COLLABORATION EXPERIENCES WITH ONLINE WORKSPACE - Online meeting experience is integrated with online and/or offline collaborative workspace(s). Documents and other content generated through team collaboration and managed by a content management system are automatically made available during the meeting, updated, and stored in collaborative workspace linked to a particular meeting. Newly generated content during the meeting is also added to the workspace. As a result, online meetings become part of the collaborative workspace rendering reusable and searchable data through meeting content and updates to associated documents.07-30-2009

Pramit H. Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20140114955SEARCH-AS-YOU-TYPE ON A RELATIONAL DATABASE - A search system, separate from a relational database, generates an index of information in the relational database that can be used to look up business records (or entities). A search system, that is also separate from the relational database, receives typing or other character inputs in a search user input mechanism and generates queries against the index based on the typing inputs, or other character inputs, received. The search system returns results and modifies those results as additional typing inputs, or characters, are received.04-24-2014

Ronakkumar Desai, Redmond, WA US

Patent application numberDescriptionPublished
20120131025SCALABLE CHUNK STORE FOR DATA DEDUPLICATION - Data streams may be stored in a chunk store in the form of stream maps and data chunks. Data chunks corresponding to a data stream may be stored in a chunk container, and a stream map corresponding to the data stream may point to the data chunks in the chunk container. Multiple stream maps may be stored in a stream container, and may point to the data chunks in the chunk container in a manner that duplicate data chunks are not present. Techniques are provided herein for localizing the storage of related data chunks in such chunk containers, for locating data chunks stored in chunk containers, for storing data streams in chunk stores in localized manners that enhance locality and decrease defragmentation, and for reorganizing stored data streams in chunks stores.05-24-2012

Ronakkumar N. Desai, Redmond, WA US

Patent application numberDescriptionPublished
20110276780Fast and Low-RAM-Footprint Indexing for Data Deduplication - The subject disclosure is directed towards a data deduplication technology in which a hash index service's index maintains a hash index in a secondary storage device such as a hard drive, along with a compact index table and look-ahead cache in RAM that operate to reduce the I/O to access the secondary storage device during deduplication operations. Also described is a session cache for maintaining data during a deduplication session, and encoding of a read-only compact index table for efficiency.11-10-2011
20110276781Fast and Low-RAM-Footprint Indexing for Data Deduplication - The subject disclosure is directed towards a data deduplication technology in which a hash index service's index maintains a hash index in a secondary storage device such as a hard drive, along with a compact index table and look-ahead cache in RAM that operate to reduce the I/O to access the secondary storage device during deduplication operations. Also described is a session cache for maintaining data during a deduplication session, and encoding of a read-only compact index table for efficiency.11-10-2011
20120166401Using Index Partitioning and Reconciliation for Data Deduplication - The subject disclosure is directed towards a data deduplication technology in which a hash index service's index is partitioned into subspace indexes, with less than the entire hash index service's index cached to save memory. The subspace index is accessed to determine whether a data chunk already exists or needs to be indexed and stored. The index may be divided into subspaces based on criteria associated with the data to index, such as file type, data type, time of last usage, and so on. Also described is subspace reconciliation, in which duplicate entries in subspaces are detected so as to remove entries and chunks from the deduplication system. Subspace reconciliation may be performed at off-peak time, when more system resources are available, and may be interrupted if resources are needed. Subspaces to reconcile may be based on similarity, including via similarity of signatures that each compactly represents the subspace's hashes.06-28-2012
20130064336Data Synchronization Policies - Techniques for data synchronization policies are described. In one or more implementations, techniques may be employed to set data synchronization (“sync”) policies for devices in a data sync environment. The sync policies specify parameters for sync operations in the sync environment, such as how frequently data sync operations are performed, what types of data are synced to particular devices, how frequently particular types of data are synced, and so on. In implementations, the sync policies consider the number of devices that are participating in a sync environment and attributes of the devices in specifying parameters for sync operations. Data can be synchronized among devices in the sync environment based on the sync policies.03-14-2013

Patent applications by Ronakkumar N. Desai, Redmond, WA US

Rushi Desai, Redmond, WA US

Patent application numberDescriptionPublished
20090199207PRIORITY MESSAGING AND PRIORITY SCHEDULING - Systems and methods that set priority levels to messaging systems initiated between end points (e.g., two SQL point services) thru service brokers. A priority component can apply priority at a session level to add priority capabilities on top of service brokers, and enable setting priority for all the messages in a session or conversation. Such priority can further affect the order in which messages from different conversations are sent and the order in which they are received.08-06-2009

Shikha Devesh Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20140380142CAPTURING WEBSITE CONTENT THROUGH CAPTURE SERVICES - Website content curation can be performed through a capture service receiving a clipping of a web page rendered in a web browser. A clipping of at least a portion of the web page can be sent to multiple applications. The source of the clip can remain intact and be provided as part of the clipping. When a region of the web page is selected for a clip to one or more of multiple available applications, the clip can include an extended portion outside of a region specifically selected as the clip. A preview experience can be provided in which the clipping can be viewed and edited.12-25-2014
20150046493ACCESS AND MANAGEMENT OF ENTITY-AUGMENTED CONTENT - Access and management of a user's content may be facilitated by, in response to receiving a request for content related to a specified entity from the repository associated with at least the user's account, identifying, in a content of a file in the repository, an entity container of at least one entity container associated with the specified entity; and communicating the entity container that is associated with the specific entity to a source of the request.02-12-2015
20150046827AUTOMATIC AUGMENTATION OF CONTENT THROUGH AUGMENTATION SERVICES - A method of automatically augmenting content through augmentation services can include invoking a service to receive an entity determination based on the content and an entity container comprising an object of the content and one or more attributes of the object. The entity determination and corresponding entity container can be assigned as a marker to content being clipped. The marker can be used to enable access and actions that can be taken with respect to the clipping or the structured information augmenting the clipping.02-12-2015

Vidhi A. Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20080244253SYSTEM, METHOD AND PROGRAM FOR SELECTIVELY REBOOTING COMPUTERS AND OTHER COMPONENTS OF A DISTRIBUTED COMPUTER SYSTEM - Selectively rebooting components of a computer system. One or more tables which list respective costs to reboot the components and respective likelihoods that reboots of the respective components will correct respective problems with the computer system are generated. Each of the costs is based on a time to reboot or delays caused by the reboot of the respective component. In response to a subsequent problem with the computer system, an order to reboot components of the computer system is determined from the table based on the costs and likelihoods that the reboot will correct the problem, such that a component of the computer system characterized by a relatively low cost and high likelihood to correct the problem will be rebooted before another component characterized by a relatively high cost and low likelihood to correct the problem. The tables are updated through actual experience.10-02-2008

Vikram Desai, Bellevue, WA US

Patent application numberDescriptionPublished
20100306777WORKFLOW MESSAGE AND ACTIVITY CORRELATION - Embodiments are directed to generating trace events that are configured to report an association between a workflow activity and a message. A computer system receives a message over a communication medium, where the workflow activity includes a unique workflow activity identifier (ID) that uniquely identifies the workflow activity. The message also includes a unique message ID that uniquely identifies the message. The computer system generates a trace event that includes a combination of the unique workflow activity ID and the unique message ID. The trace event is configured to report the association between the workflow activity and the message. The computer system also stores the generated trace event in a data store.12-02-2010

Vikram Desai, Redmond, WA US

Patent application numberDescriptionPublished
20120158925MONITORING A MODEL-BASED DISTRIBUTED APPLICATION - A method for monitoring a model-based distributed application includes accessing a declarative application model describing an application intent, and deploying a model-based distributed application in accordance with the declarative application model. Events associated with the deployed application are received from a node. The received events are aggregated into node-level aggregations using a node manager. The node-level aggregations are aggregated into higher-level metrics based on the declarative application model. The higher-level metrics are stored for use in making subsequent decisions related to the behavior of the deployed application.06-21-2012
20120159517MANAGING A MODEL-BASED DISTRIBUTED APPLICATION - A method for managing a model-based distributed application includes accessing a declarative application model describing an application intent for each of multiple application dimensions, and deploying a model-based distributed application in accordance with the declarative application model. Events associated with the deployed application are received. An observed state of the deployed application is determined for each of the multiple dimensions based on the received events. Operation of the deployed application is modified when the observed state for any one of the multiple dimensions deviates from the application intent for that dimension.06-21-2012
20130117435Context-Aware Model-Driven Hierarchical Monitoring Metadata - Metrics are defined and collected for an application. The metrics are organized in hierarchical trees with metrics aggregated at each node in the trees. Each tree represents a different permutation of the metrics. A particular metric may occur in more than one tree. A user interface provides a default drill-down that allows users to jump from one metric to another so that only the most useful information is presented to the user. The default drill-down is defined to provide the user with a best practices method to identify and correct problems or errors in the application. Users may modify the default drill-down path.05-09-2013

Vikrant H. Desai, Woodinville, WA US

Patent application numberDescriptionPublished
20100030871POPULATING AND USING CACHES IN CLIENT-SIDE CACHING - Aspects of the subject matter described herein relate to client-side caching. In aspects, when a client receives a request for data that is located on a remote server, the client first checks a local cache to see if the data is stored in the local cache. If the data is not stored in the local cache, the client may check a peer cache to see if the data is stored in the peer cache. If the data is not stored in the peer cache, the client obtains the data from the remote server, caches it locally, and publishes to the peer cache that the client has a copy of the data.02-04-2010
Website © 2015 Advameg, Inc.