Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Geetha

Geetha Adinarayan, Bangalore IN

Patent application numberDescriptionPublished
20130283289ENVIRONMENTALLY AWARE LOAD-BALANCING - A method and associated systems for the environmentally aware load-balancing of components of a multi-component power-consuming system. The environmentally aware load-balancer receives continually updated values from at least two environmental sensors that monitor and report the values of environmental metrics that characterize components of the power-consuming system and the environments within which those components are located. When the load-balancer receives a task request directed to the power-consuming system, the load-balancer selects a balanced workload allocation as a function of the values of the received environmental metrics and communicates that balanced workload allocation to a routing mechanism. The routing mechanism then uses the communicated balanced workload allocation to determine which component or components of the power-consuming system should receive the task request.10-24-2013

Geetha Ahilan, Glastonbury, CT US

Patent application numberDescriptionPublished
20120072242SYSTEM AND METHOD FOR ADMINISTRATION OF NEW BUSINESS SUBMISSIONS - A computer system includes a web server component and a rules engine component in communication with the web server component. The rules engine component receives input rating information that is relevant to insurance coverage rating decisions. The rules engine component applies rating rules to the input rating information to generate premium quotations for a proposed insurance policy. The web server component downloads a quotation display page to a client computer. The quotation display page includes two different quotation sections positioned side-by-side. Each quotation section provides a different premium quotation, with the premium quotations based on mutually different sets of input rating information.03-22-2012

Geetha Chandu, Bangalore IN

Patent application numberDescriptionPublished
20160112276RECONSTRUCTION OF AN OPTICAL NETWORK LINK IN A LINK VIEWER BASED ON A TEXT FILE - A device may be configured to receive a text file including network information for an optical network. The network information may include information for an optical route in the optical network. The device may generate a user interface based on the text file. The user interface may display a representation of the optical route. The device may provide the user interface for display and receive a user input via the user interface. The device may change the representation of the optical route displayed by the user interface based on the user input and the network information included in the text file.04-21-2016

Geetha Dabir, Saratoga, CA US

Patent application numberDescriptionPublished
20120246637Distributed load balancer in a virtual machine environment - In one embodiment, a method includes receiving a request packet at a flow director in communication with a plurality of servers, each server comprising a virtual load balancer module and one or more virtual machines and forwarding the request packet to one of the virtual load balancer modules at one of the servers. The virtual load balancer module is configured to select one of the virtual machines to receive the request packet and transmit a response packet. The response packet is transmitted without passing through the flow director. An apparatus for load balancing in a virtual machine environment is also disclosed.09-27-2012

Geetha Kakarlapudi, San Francisco, CA US

Patent application numberDescriptionPublished
20140012966Distributed Virtual Switch Configuration and State Management - Techniques are disclosed for pushing configuration changes of a distributed virtual switch from a management server to a plurality of host servers underlying the distributed virtual switch. The approach includes sending, in parallel, by the management server, a message to each of the plurality of host servers. The message specifies a final configuration state for one or more virtual ports emulated via virtualization layers of the host servers. The approach further includes determining, by each of the plurality of host servers, port state configuration changes to make to the virtual ports to achieve the final configuration state, and reconfiguring, by each of the plurality of host servers, their respective virtual ports, to match the final configuration state.01-09-2014
20160105381DISTRIBUTED VIRTUAL SWITCH CONFIGURATION AND STATE MANAGEMENT - Techniques are disclosed for pushing configuration changes of a distributed virtual switch from a management server to a plurality of host servers underlying the distributed virtual switch. The approach includes sending, in parallel, by the management server, a message to each of the plurality of host servers. The message specifies a final configuration state for one or more virtual ports emulated via virtualization layers of the host servers. The approach further includes determining, by each of the plurality of host servers, port state configuration changes to make to the virtual ports to achieve the final configuration state, and reconfiguring, by each of the plurality of host servers, their respective virtual ports, to match the final configuration state.04-14-2016

Geetha Kalahasti, Dallas, TX US

Patent application numberDescriptionPublished
20150118176COSMETIC COMPOSITIONS - Disclosed are compositions and methods for their use that can be used individually or in combination. The compositions have the ability to treat a wide range of skin and skin conditions, and particularly men's skin.04-30-2015

Geetha Kanhangad-Gangadharan, Bangalore IN

Patent application numberDescriptionPublished
20080286387Standardized method for recovering enriched Indian date extract (IDE), properties of IDE and applications thereof - Disclosed are (i) a standardized method for the recovery of the polyphenolic contents from the seed coats of 11-20-2008
20100075360UV BASED CELL VIABILITY AS AN INDICATOR OF SUN PROTECTION FACTOR AND METHODS OF MEASUREMENT THEREOF - Disclosed is a simple method of determining SPF based on the staining pattern of viable cells like mouse fibroblasts and human keratinocytes after exposure to ultraviolet radiations. The method provides results comparable to the standard methods of SPF measurement using human subjects.03-25-2010
20100240767Melanogenesis inhibitiuon by 3,5-dimethoxy-4'-hydroxystilbenes and cosmeceutical compositions thereof - Disclosed is the cosmeceutical potential of 3,5-dimethoxy-4′-hydroxystilbene in terms of its melanogenesis inhibitory and photo protective activities. Also disclosed does a topical melanogenesis inhibitory composition comprising 0.01 to 50% by weight of 3,5-dimethoxy-4′-hydroxystilbene.09-23-2010
20110033565Protective Compositions for Dermal Papilla Cells - Disclosed are novel protective compositions for dermal papilla cells. In an embodiment the protective compositions of the present invention comprise 0.25% w/w or above of compositions comprising at least 10% w/w and above of 1-O-galloyl-β-D-glucose (β-glucogallin). In an embodiment, the said protective composition additionally comprises 50% to greater than 50% gallates including mucic acid 1,4-lactone 5-O-gallate, mucic acid 2-O-gallate, mucic acid 6-Methyl ester 2-O-gallate, mucic acid 1-Methyl ester 2-O-gallate and ellagic acid. In another embodiment the invention also encompasses synergistic protective compositions comprising the said protective compositions and 0.5% concentrate of liquid endosperm of 02-10-2011

Patent applications by Geetha Kanhangad-Gangadharan, Bangalore IN

Geetha Mangalore, San Diego, CA US

Patent application numberDescriptionPublished
20110119743COMMUNICATION OF CONTENT TO EVENT ATTENDEES - A method is provided for enrolling and authenticating an attendee of an event or activity so that content can be delivered to a mobile device associated with the attendee. The method includes receiving an identifier of a mobile communication device associated with an authorized attendee while the attendee and the mobile communication device are in a venue at which the event or activity takes place. The mobile communication device is registered by storing the identifier in a database of authorized attendees who have entered the venue. Entitlement credentials are communicated to the mobile device that are to be further communicated from the mobile device to a content server when requesting event or activity related content therefrom.05-19-2011
20110129087System and Method for Encrypting and Decrypting Data - A method is provided for creating an encrypted data file from a data file having a sample entry box and a media data box. The sample entry box has description information therein. The media data box includes media data therein. The method includes: receiving the data file; encrypting the media data within the media data box with an encryption key; replacing the sample entry box with an encoded box; creating a sinf box within the encoded box; creating a form a box within the sinf box; and creating an schm box within the sinf box. The schm box indicates the type of formatting of the encrypted media data. The encoded box does not include an initial counter that may be used to decrypt the encrypted media data.06-02-2011
20110145562SYSTEM AND METHOD FOR SECURELY TRANSFERING CONTENT FROM SET-TOP BOX TO PERSONAL MEDIA PLAYER - A media player is provided for receiving session data from a security socket layer. The session data includes encrypted content data, a content key and digital rights data, wherein the content key and the digital rights data have been encrypted with a SSL session key. The said media player includes a first processor portion and a second processor portion. The first processor portion is arranged to receive the session data, has a second key. The first processor portion and can generate the SSL session key and can decrypt the session data with the SSL session key. The first processor portion can further re-encrypt the decrypted content key with the second key and can output the re-encrypted content key and digital rights data. The second processor portion is arranged to receive the re-encrypted content key and digital rights data. The first processor portion can further decrypt the content, and is externally inaccessible.06-16-2011
20110235801SECURE TRANSCODING OF CONTENT - A source device determines content rights for encrypted content in the first encoding standard using a first rights data file. The source device creates a second rights data file for transcoded content in the second encoding standard. The source device performs a key management operation including communicating a decryption key for the encrypted content in the first encoding standard to a transcoder. The source device transfers the encrypted content in the first encoding standard to the transcoder. The transcoder decrypts the encrypted content, transcodes the content from the first encoding standard to the content in the second encoding standard, and re-encrypts the content in the second encoding standard using a second encryption key. The transcoder then transfers the encrypted content in the second encoding standard to an indicated device.09-29-2011
20110289592DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols.11-24-2011
20120131339SYSTEM AND METHOD FOR SECURE BI-DIRECTIONAL COMMUNICATION - An aspect of the present invention provides a method of communicating within a system having a first device, a second device, a key distribution device and an interactive service portal device. The method includes: storing a tag within the interactive service portal device; associating the tag with the first device; registering the first device with the key distribution device; associating, by way of the key distribution device, an encryption key with the first device; accessing, by way of the second device, the tag; providing information to the second device; and establishing secure bi-directional interactive communication, corresponding to the tag, between the first device and the second device based on a relationship between the information and the encryption key.05-24-2012
20140095890SYSTEMS AND METHODS FOR MANIPULATING SENSITIVE INFORMATION IN A SECURE MOBILE ENVIRONMENT - Methods and devices for protecting and manipulating sensitive information in a secure mobile environment are disclosed. Methods and devices for processing secure transactions and secure media processing up to rendering in human readable form using abstract partitioning between non-secure and secure environments are disclosed.04-03-2014
20140270161METHOD AND APPARATUS FOR SECURE STORAGE AND RETRIEVAL OF LIVE OFF DISK MEDIA PROGRAMS - A method and system are provided for securely storing and retrieving live off-disk media programs. Events delineate media segments, each of which are encrypted with a different key so as to be streamable to a remote device via digital living network alliance (DLNA) or HTTP live streaming protocols. Media segments and identifiers for managing the storage and retrieval of such media segments are compatible with live streaming data structures, obviating the need to re-encrypt data streams.09-18-2014
20140376719DTCP Converter for HLS - A method for DTCP to HLS conversion is provided that starts with a standard DTCP Protected Content Packet (PCP) structure. The PCP payload data is chunked at defined chunk boundaries. Each chunk is then appended with a pad to be compatible with HLS. An HLS playlist is then provided using the PCP header with identification of the chunks and a keytag. The chunk is encrypted with a DTCP key calculated by the DTCP standard using: (a) copy control bits; (b) a nonce, and (c) an exchange key ID. Relevant PCP header fields are provided in the keytag for the HLS playlist, including the value of the copy control bits, the nonce and the exchange key ID, supporting the transaction that enables calculation of the DTCP content key to enable later decryption of the chunks.12-25-2014
20140380352Trick Play Seek Operation for HLS Converted from DTCP - A process to enable trick play operations is provided for HLS streaming video that has been converted by a system from DTCP. The system server provides a modified SEEK operation when an HLS GET message is received from an HLS client player. For the process, a DLNA header is provided from the HLS client player by including it in the HLS GET message. The HLS client also provides a DLNA RANGE REQUEST that requests a range of chunks making up a video desired and a seek point from where a seek operation is needed. The HLS server recognizes the DLNA header of the HLS GET message and DLNA RANGE REQUEST and obtains a range of chunks making up an extent of the recorded video using metadata fields. The server then generates a new HLS playlist with identification of the chunks and keytag corresponding to the seek operation. The server will provide chunks from the seek point and a rolling playlist to identify chunks and keytag from the seek point.12-25-2014
20150244973COPY COUNT FOR DTCP WITH AN ABBREVIATION HASH USED FOR CHECK IN COPY - A Digital Rights Management (DRM) system is provided that reduces time for a move transaction using DTCP-IP when a copy is moved back or checked back in to an originating Personal Video Recorder (PVR). During a DTCP MOVE transaction, instead of transferring the full asset in a check back in operation to the PVR, a unique and abbreviated representation of the original copy of the asset would be made for the transfer. This abbreviated representation takes the form of a hash constructed from a hashing function which uses characteristics of the asset as inputs. This hash will have to be a unique and near guaranteed indicator of the original content, to a high probability, so that the copy control system could live up to the spirit of the DTCP spec and the DLNA interoperability guidelines.08-27-2015
20160078198DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols.03-17-2016
20160092663DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols.03-31-2016

Patent applications by Geetha Mangalore, San Diego, CA US

Geetha Remadevi, Sunnyvale, CA US

Patent application numberDescriptionPublished
20140301392NETWORK DEVICE WITH TUNNEL ESTABLISHMENT CONTROL BASED ON SITE-TYPE ATTRIBUTE RECEIVED FROM OTHER NETWORK DEVICE - In one embodiment, a first network device is configured to receive from a second network device a site-type attribute of the second network device, and to control establishment of a tunnel between the first network device and the second network device based at least in part on the received site-type attribute. The site-type attribute may be received in the first network device as part of a Border Gateway Protocol (BGP) message transmitted by the second network device to the first network device, and may comprise a Multicast Virtual Private Network (MVPN) site-type attribute indicating whether the second network device is a sender site of the MVPN. Controlling establishment of the tunnel between the first network device and the second network device may comprise preventing setup of the tunnel if the received site-type attribute indicates that the second network device is a sender site of the MVPN.10-09-2014

Geetha Srinivasen, Belfast GB

Patent application numberDescriptionPublished
20120128968ELECTRODEPOSITION OF ELEMENTAL ZIRCONIUM - The present invention relates to the electrodeposition of elemental zirconium at a temperature of less than 100° C. from a mixture of a Lewis acid, a zirconium salt and an ionic liquid.05-24-2012
20120234687SOLDERING PROCESS USING ELECTRODEPOSITED INDIUM AND/OR GALLIUM, AND ARTICLE COMPRISING AN INTERMEDIATE LAYER WITH INDIUM AND/OR GALLIUM - The present invention relates to a low temperature process for producing and joining metal substrates using an intermediate layer comprising indium or gallium, wherein the indium or gallium layer is formed by electrodeposition from an ionic liquid comprising an indium or gallium salt.09-20-2012

Geetha Vijayan, Austin, TX US

Patent application numberDescriptionPublished
20080216095Graphics for End to End Component Mapping and Problem-Solving in a Network Environment - An example of a solution provided here comprises receiving as input at least one event (chosen from an event generated by an application probe, and an event generated by a component probe), and providing graphical output based on said inputs, whereby a user correlates a component problem with a performance problem affecting an application. Methods connected with graphics for end to end component mapping and problem-solving in a network environment, systems for executing such methods, and instructions on a computer-usable medium, for executing such methods, are provided.09-04-2008
20130311651EVALUATION OF PERFORMANCE OF SOFTWARE APPLICATIONS - A method and system for evaluating performance of software applications of different web sites. Steps in a first software application of a first web site are mapped to respective similar-function steps in a second software application of a second web site. The mapping for each step in the first software application includes associating both each step in the first software application and the respective similar-function step in the second software with a respective task. Measures of performance of each mapped step in the first software application and measures of performance of the respective similar-function steps and of other steps in the second software application are determined and included in a report. A measure of performance of the first software application and a measure of performance of the second software application are included in the report.11-21-2013

Patent applications by Geetha Vijayan, Austin, TX US

Website © 2016 Advameg, Inc.