Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Kundu, US

Abhijit Kundu, Woodinville, WA US

Patent application numberDescriptionPublished
20100241495OFFLINE CASHBACK ADVERTISEMENTS - Embodiments of the present invention relate to systems, methods and computer storage media for providing an advertisement to a consumer in an online environment for utilization in an offline environment. The offline utilization of the coupon by the consumer allows for an amount owed to an advertisement-service provider by a merchant to be reduced. The advertisement-service provider provides, for a fee, advertising services for the merchant, which includes presenting a coupon to the consumer in an online environment. The consumer is presented with the coupon by the advertisement-service provider on behalf of the merchant. In one embodiment, the consumer stores the coupon for later redemption in an offline environment. The consumer purchases goods or service in an offline environment utilizing the coupon. The advertisement-service provider reduces an amount the merchant owes as a result of the consumer's offline redemption of the coupon.09-23-2010

Amitava Kundu, Maple Grove, MN US

Patent application numberDescriptionPublished
20140303356PRODUCTION OF HETERODIMERIC PROTEINS - The present invention relates to an in vitro method for production of heterodimeric proteins.10-09-2014

Amlan Kundu, Ashburn, VA US

Patent application numberDescriptionPublished
20080273743Synthesis of databases of realistic, biologically-based 2-D images - A method and computer program product to create an unlimited number of synthetic but realistic, biologically-based, 2-D images like irises and magnetic resonance images (MRIs), as well as other images is presented. New metrics for measuring the mathematical distance of such synthetic images from a source (original) image have also been proposed. These metrics and the synthesis procedure are applicable to the development of image retrieval systems. The presented method can be extended to synthetic images of non-biological origins too.11-06-2008

Animesh Kundu, Bethlehem, PA US

Patent application numberDescriptionPublished
20090117028RAPID SYNTHESIS OF TITANATE NANOMATERIALS - Provided herein is a hydrothermal process for the rapid synthesis of inorganic nanomaterials (e.g., nanofibers) containing sodium, bismuth, titanium, and oxygen, as well as new compositions made thereby. The process involves heating an aqueous solution or suspension of suitable salts of aforementioned elements at elevated temperature and pressure under constant stirring in a hermetically sealed vessel for a predetermined amount of time (e.g., less than two hours). The powder thus obtained contains nanofibers of rectangular cross-section, with the smallest fibers typically have a cross section of 16 nm×40 nm. Example fibers made by such processes have an aspect ratio exceeding 200.05-07-2009

Anup Kundu, Kenner, LA US

Patent application numberDescriptionPublished
20120308642INHIBITING HEPATITIS C VIRAL REPLICATION WITH SIRNA COMBINATIONS - Compositions are disclosed of combinations of small interfering RNAs (siRNA) that can inhibit the replication of hepatitis C virus (HCV) in liver cells, along with methods of co-administering the siRNAs to subjects. Further, methods are disclosed for improving the delivery of nucleic acids to the liver.12-06-2012

Ashish Kundu, Hawthorne, NY US

Patent application numberDescriptionPublished
20130247135METHOD AND APPARATUS FOR SECURITY-AWARE ELASTICITY OF APPLICATION AND SERVICES - In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.09-19-2013

Ashish Kundu, Yorktown Heights, NY US

Patent application numberDescriptionPublished
20150244714AUTOMATIC SECURITY PARAMETER MANAGEMENT AND RENEWAL - A method of automatic security parameter renewal including determining if a security parameter satisfies a renewal condition and automatically updating the security parameter when the renewal condition is satisfied.08-27-2015

Ashish Kundu, Elmsford, NY US

Patent application numberDescriptionPublished
20130185413Integrated Metering of Service Usage for Hybrid Clouds - An embodiment is directed to a hybrid cloud environment wherein a user of cloud computing services is disposed to consume cloud provided services delivered by each of a plurality of cloud computing service providers. Specified event data is received at an MCS component, wherein the event data pertains to metering events related to consumed services delivered by one or more cloud service providers. Event data includes event data furnished by one or more entities that actively monitor metering events at one or more local or remote cloud service provider locations. Event data is sent from the MCS component to a metering system, and the metering system generates reports from the event data that contains usage information on services provided by one or more cloud service providers, wherein information for a provider specifies amounts and quality of each type of service delivered to users by the provider.07-18-2013
20140082613PROVISIONING A VIRTUAL MACHINE FROM ONE OR MORE VM IMAGES - An embodiment of the invention directed to a method for provisioning a specified virtual machine from one or more selected images, sent over the network, includes the step of decomposing each of the selected VM images to provide a group of components, each component having specified information associated with it. The method further includes using a predetermined selection criterion to select components from the group for assembly into a specified VM image, and using the selected components of the specified VM image to provision the specified virtual machine at one or more locations.03-20-2014
20140082615PROVISIONING A VIRTUAL MACHINE FROM ONE OR MORE VM IMAGES - An embodiment of the invention directed to a method for provisioning a specified virtual machine from one or more selected images, sent over the network, includes the step of decomposing each of the selected VM images to provide a group of components, each component having specified information associated with it. The method further includes using a predetermined selection criterion to select components from the group for assembly into a specified VM image, and using the selected components of the specified VM image to provision the specified virtual machine at one or more locations.03-20-2014
20140096133METHOD AND APPARATUS FOR AUTHENTICATED DISTRIBUTION OF VIRTUAL MACHINE IMAGES - A computer implemented method, a computer program product, and a computer distribute a virtual machine image. A request for a virtual machine image is received. Responsive to receiving the request or the virtual machine image, the authenticity of a virtual machine image catalog associated with the virtual machine image is identified. Responsive to identifying that the virtual machine image catalog is authentic, a first digital signature to be sent with the virtual machine image is determined. Responsive to determining the signature, the virtual machine image and the signature is sent.04-03-2014
20140096135METHOD FOR AUTHENTICATED DISTRIBUTION OF VIRTUAL MACHINE IMAGES - A computer implemented method distributes a virtual machine image. A request for a virtual machine image is received. Responsive to receiving the request or the virtual machine image, the authenticity of a virtual machine image catalog associated with the virtual machine image is identified. Responsive to identifying that the virtual machine image catalog is authentic, a first digital signature to be sent with the virtual machine image is determined. Responsive to determining the signature, the virtual machine image and the signature is sent.04-03-2014
20140101714PRIVACY AWARE AUTHENTICATED MAP-REDUCE - A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation.04-10-2014
20140101715PRIVACY AWARE AUTHENTICATED MAP-REDUCE - A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation.04-10-2014
20140136689SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information.05-15-2014
20140136707SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information.05-15-2014
20140137247Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network.05-15-2014
20140137272Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network.05-15-2014
20140181058APPARATUS FOR AUTHENTICATION OF SOLUTION TOPOLOGY - A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology.06-26-2014
20140181980SYSTEM AND METHOD FOR PROTECTION FROM BUFFER OVERFLOW VULNERABILITY DUE TO PLACEMENT NEW CONSTRUCTS IN C++ - Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow.06-26-2014
20140181981SYSTEM AND METHOD FOR PROTECTION FROM BUFFER OVERFLOW VULNERABILITY DUE TO PLACEMENT NEW CONSTRUCTS IN C++ - Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow.06-26-2014
20140181984METHOD AND APPARATUS FOR AUTHENTICATION OF SOLUTION TOPOLOGY - A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology.06-26-2014
20140259089Security-Aware Admission Control of Requests in a Distributed System - Techniques, systems and articles of manufacture for security-aware admission control of requests in a distributed system. A method includes identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components.09-11-2014
20140259091Security-Aware Admission Control of Requests in a Distributed System - Systems and articles of manufacture for security-aware admission control of requests in a distributed system include identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components.09-11-2014
20140289791NETWORK-LEVEL ACCESS CONTROL MANAGEMENT FOR THE CLOUD - A cloud access manager obtains input regarding access control for at least one application deployed on a plurality of virtual machine instances in a cloud computing environment; the virtual machine instances are divided into at least first and second access zones. A cloud access manager registrar located in the cloud computing environment registers internet protocol addresses of external clients as seen from the cloud computing environment; at least some of the addresses are assigned to the clients via network address translation (NAT). Session traversal utility for NAT (STUN) is carried out to determine public internet protocol addresses assigned to the clients via NAT. The cloud access manager controls (i) access of the external clients to the plurality of virtual machine instances; and (ii) access of the plurality of virtual machine instances to each other, based on the registered internet protocol addresses, in accordance with the access zones.09-25-2014
20140310531METHOD AND SYSTEM FOR SECURING THE ENTRY OF DATA TO A DEVICE - A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device with keys of the device, the key map indicating data different from that of the keys of the device.10-16-2014
20150033221SANITIZATION OF VIRTUAL MACHINE IMAGES - Sanitizing a virtual machine image of sensitive data is provided. A label for a sensitivity level is attached to identified sensitive data contained within each software component in a plurality of software components of a software stack in a virtual machine image based on labeling policies. In response to receiving an input to perform a sanitization of the identified sensitive data having attached sensitivity level labels contained within software components of the software stack in the virtual machine image, the sanitization of the identified sensitive data having the attached sensitivity level labels contained within the software components of the software stack in the virtual machine image is performed based on sanitization policies.01-29-2015
20150033223SANITIZATION OF VIRTUAL MACHINE IMAGES - Sanitizing a virtual machine image of sensitive data is provided. A label for a sensitivity level is attached to identified sensitive data contained within each software component in a plurality of software components of a software stack in a virtual machine image based on labeling policies. In response to receiving an input to perform a sanitization of the identified sensitive data having attached sensitivity level labels contained within software components of the software stack in the virtual machine image, the sanitization of the identified sensitive data having the attached sensitivity level labels contained within the software components of the software stack in the virtual machine image is performed based on sanitization policies.01-29-2015
20150220731SYSTEM AND METHOD FOR PROTECTION FROM BUFFER OVERFLOW VULNERABILITY DUE TO PLACEMENT NEW CONSTRUCTS IN C++ - Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow.08-06-2015
20150269224QUERY ROUTING BASED ON COMPLEXITY CLASS DETERMINATION - A computer implemented method, computer system, and computer program product performs a query on a relational database. When a query is received, a corresponding complexity class is determined for the query. The query is routed to a corresponding query processor based on the corresponding complexity class determined for the submitted query. The query is executed on the corresponding query processor according to a determined execution plan.09-24-2015
20150363256ADMISSION CONTROL BASED ON THE END-TO-END AVAILABILITY - Providing admission control for a request may comprise creating a process flow associated with the request, the process flow identifying a plurality of computer-implemented components and a flow of transactions occurring between the computer-implemented components; executing the flow of transactions on the plurality of computer-implemented components; logging the flow of transactions; monitoring the flow of transactions to detect a problem in the flow or one or more of the components, or combination thereof; responsive to not detecting a problem in the flow or one or more of the components, or combination thereof, allowing the request to proceed; and responsive to detecting a problem in the flow or one or more of the components, or combination thereof, not allowing the request to proceed.12-17-2015
20150365304SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - Managing a service is provided. Information is collected about use of a set of resources by the service. A request is received to verify information regarding a selected portion of a period of time during the use of the set of resources by the service. A description of the use of the set of resources by the service during the selected portion of the period of time is generated using the collected information in response to receiving the request to verify the information regarding the selected portion of the period of time during the use of the set of resources by the service. A response to the request is created using the generated description of the use of the set of resources by the service during the selected portion of the period of time as proof of validity of the information.12-17-2015
20150381526SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - Managing a service is provided. Information is collected about use of a set of resources by the service. A request is received to verify information regarding a selected portion of a period of time during the use of the set of resources by the service. In response to receiving the request to verify the information regarding the selected portion of the period of time during the use of the set of resources by the service, a description of the use of the set of resources by the service during the selected portion of the period of time is generated using the collected information. A response to the request is created using the generated description of the use of the set of resources by the service during the selected portion of the period of time as proof of validity of the information.12-31-2015

Patent applications by Ashish Kundu, Elmsford, NY US

Janardan Kundu, Houston, TX US

Patent application numberDescriptionPublished
20100022020Compositions for surface enhanced infrared absorption spectra and methods of using same - A composition comprising a substrate and at least one adsorbate associated with the substrate wherein the composition has an enhanced infrared absorption spectra. A method comprising tuning a nanoparticle to display a plasmon resonance in the infrared, associating an adsorbate with the nanoparticle to form an adsorbate associated nanoparticle, and aggregating the adsorbate associated nanoparticle. A method of preparing a SERS-SEIRA composition comprising fabricating a nanoparticle substrate, functionalizing the nanoparticle substrate to form a functionalized substrate, dispersing the functionalized substrate in solution to form a dispersed functionalized substrate, and associating the dispersed functionalized substrate with a medium.01-28-2010

Joydip Kundu, Derry, NH US

Patent application numberDescriptionPublished
20090157764Techniques for the Logical Replication of High-Level Procedures - A method and system that annotates a redo log to provide information concerning the execution of a procedure at a primary database. The annotations include entry and exit markers that indicate the beginning and the end of the execution along with any arguments passed to the procedure, and whether the execution of the procedure was successful. At the standby database, these markers are used to create a logical transaction associated with the procedure. The operations performed by the procedure are grouped into individual transactions, and these individual transactions are grouped as belonging to the logical transaction. If the execution of the procedure was successful at the primary database, then the individual transactions are discarded, and the logical transaction is applied by executing the procedure at the standby database. If the execution of the procedure failed at the primary database, then the individual transactions and the logical transaction are discarded.06-18-2009
20120059792Techniques for the Logical Replication of High-Level Procedures - A method and system that annotates a redo log to provide information concerning the execution of a procedure at a primary database. The annotations include entry and exit markers that indicate the beginning and the end of the execution along with any arguments passed to the procedure, and whether the execution of the procedure was successful. At the standby database, these markers are used to create a logical transaction associated with the procedure. The operations performed by the procedure are grouped into individual transactions, and these individual transactions are grouped as belonging to the logical transaction. If the execution of the procedure was successful at the primary database, then the individual transactions are discarded, and the logical transaction is applied by executing the procedure at the standby database. If the execution of the procedure failed at the primary database, then the individual transactions and the logical transaction are discarded.03-08-2012
20140068584DATABASE SOFTWARE UPGRADE USING SPECIFY-VALIDATE-EXECUTE PROTOCOL - A method, system, and computer program product for upgrading high-availability database systems. The method commences by specifying a subject database configuration state (e.g., an initial state) as well as an upgraded database configuration state (e.g., an upgraded state). Then, the method performs operations for compiling the specifications and validating the upgraded database configuration state with respect to the specified subject database configuration state. Compile errors are reported and a user can change the specifications. Once the compiler determines that the upgraded configuration state can be reached from the subject database configuration state, then the method generates an upgrade plan. The upgrade plan is executed by a computer-implemented controller. During execution of the plan, the controller pauses for accepting user intervention at key execution points. The controller monitors state changes to establish checkpoints. In the event of execution errors detected during execution of the plan, corrective action reports are output.03-06-2014

Patent applications by Joydip Kundu, Derry, NH US

Joydip Kundu, Nashua, NH US

Patent application numberDescriptionPublished
20120041926TECHNIQUES FOR INCREASING THE USEFULNESS OF TRANSACTION LOGS - Techniques for making light-weight checkpoints in logs of streams of transactions and for extending the logs from the checkpoints. The state saved in the light weight checkpoint need only include the state of all transactions that are active at a prior point in the log and are still active at the checkpoint. A log is extended from the checkpoint by processing new transactions in the transaction stream beginning at the prior point to produce the extending log. When the checkpoint is reached, the state saved at the checkpoint is used to continue to produce the extending log. Techniques are further disclosed for selecting points in the stream of transactions at which the checkpoints may be made and for determining the distance between checkpoints. As disclosed, the log in which the checkpoints are used is a logical log made from a physical log produced by a relational database system. The logical log may be used for replication and for data mining.02-16-2012

Joydip Kundu, Malden, MA US

Patent application numberDescriptionPublished
20160058796RETINA EXTRACELLULAR MATRIX BASED BIOMATERIAL - The present technology relates to compositions and methods useful for preventing and treating degenerative eye diseases or disorders. The compositions and methods include ocular biomaterials. In some embodiments, the ocular biomaterial compositions include retinal biomaterial, interphotoreceptor matrix biomaterial or a combination thereof. In some embodiments, the ocular biomaterial compositions are formed into films, gels, scaffolds and matrices for cell delivery.03-03-2016

Kousik Kundu, Atlanta, GA US

Patent application numberDescriptionPublished
20110070166REDUCED DYE PROBES FOR THE DETECTION OF RADICAL OXYGEN SPECIES - Reduced dyes, such as hydrocyanines, deuterocyanines, and/or other deuterated dyes capable of detecting one or more reactive oxygen species are described herein. The reduced dyes exhibit little or no fluorescence due to the disrupted π conjugation. However, upon reaction with ROS, the reduced dyes are oxidized, regenerating the extended π conjugation and causing a substantial increase in fluorescence intensity. In many case, the oxidized dye is generally membrane impermeable. However, upon reduction, many of the reduced dyes are membrane permeable. Thus, reduced dyes can accumulate in cells and/or tissue to amplify the signal. Once inside the cell or tissue, the reduced dye is reoxidized upon reaction with ROS, and the oxidized dye again becomes membrane impermeable, trapping the dye within the cell. The reduced dyes can be used to image ROS, such as hydroxide radical and superoxide, in serum, cell cultures, tissue explants, and in vivo.03-24-2011
20120302575Methods for Preventing Oxidative Stress Injury of a Tissue by a Folate-Tempol Conjugate. - The present disclosure is generally related to methods of preventing oxidative stress injury induced by renal is-chemia-reperfusion by a Folate-TEMPOL conjugate.11-29-2012

Kousik Kundu, Lincoln, NE US

Patent application numberDescriptionPublished
20130280172FLUORESCENT IMAGING WITH SUBSTITUTED CYANINE DYES - Compounds and methods are disclosed that are useful for noninvasive imaging in the near-infrared spectral range. The cyanine compounds of Formula I are presented:10-24-2013
20140105826REDUCED DYE PROBES FOR THE DETECTION OF RADICAL OXYGEN SPECIES - Reduced dyes, such as hydrocyanines, deuterocyanines, and/or other deuterated dyes capable of detecting one or more reactive oxygen species are described herein. The reduced dyes exhibit little or no fluorescence due to the disrupted π conjugation. However, upon reaction with ROS, the reduced dyes are oxidized, regenerating the extended π conjugation and causing a substantial increase in fluorescence intensity. In many case, the oxidized dye is generally membrane impermeable. However, upon reduction, many of the reduced dyes are membrane permeable. Thus, reduced dyes can accumulate in cells and/or tissue to amplify the signal. Once inside the cell or tissue, the reduced dye is reoxidized upon reaction with ROS, and the oxidized dye again becomes membrane impermeable, trapping the dye within the cell. The reduced dyes can be used to image ROS, such as hydroxide radical and superoxide, in serum, cell cultures, tissue explants, and in vivo.04-17-2014
20140213473APPLICATION OF REDUCED DYES IN IMAGING - The present invention provides novel compounds and methods for hydrocyanines derived from near-infrared cyanine dyes, as reactive oxygen species probes in imaging. In certain embodiments, the present invention provides reduced dyes as substrates for ELISA and Western blots.07-31-2014
20150346202STABILIZED CHEMILUMINESCENT SYSTEM - The present invention relate to formulations, systems, kits and methods for chemiluminescence assays to detect the catalytic activity of a peroxidase. The present invention provides formulations and methods for chemiluminescence reactions that have significantly improved signal duration, which signal lasts for hours.12-03-2015

Patent applications by Kousik Kundu, Lincoln, NE US

Malay Kundu, Lexington, MA US

Patent application numberDescriptionPublished
20080226129Cart Inspection for Suspicious Items - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer.09-18-2008
20100166324METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS - A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.07-01-2010
20120127316METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS - A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.05-24-2012
20120188377CART INSPECTION FOR SUSPICIOUS ITEMS - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer.07-26-2012
20120320199NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments.12-20-2012
20120320214NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments. For example, in accordance with one embodiment, the alerting can take place in substantially real-time, when the event occurs, allowing personnel to take appropriate measures, corrective or otherwise, to deal with the detected event. Examples of such events may include situations such as when a person of interest is detected as shopping at the store, when a cashier has missed scanning an item at the checkout, or to alert store personnel if a non-empty shopping cart has exited the store without payment (a.k.a., a cart push-out). Although the discussion below uses a grocery store as an example retail environment, embodiments herein can be used in any type of retail environment.12-20-2012
20120321146NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments. For example, in accordance with one embodiment, the alerting can take place in substantially real-time, when the event occurs, allowing personnel to take appropriate measures, corrective or otherwise, to deal with the detected event. Examples of such events may include situations such as when a person of interest is detected as shopping at the store, when a cashier has missed scanning an item at the checkout, or to alert store personnel if a non-empty shopping cart has exited the store without payment (a.k.a., a cart push-out). Although the discussion below uses a grocery store as an example retail environment, embodiments herein can be used in any type of retail environment.12-20-2012
20130004090IMAGE PROCESSING TO PREVENT ACCESS TO PRIVATE INFORMATION - A processing resource receives original image data by a surveillance system. The original image data captures at least private information and occurrence of activity in a monitored region. The processing resource applies one or more transforms to the original image data to produce transformed image data. Application of the one or more transforms sufficiently distorts portions of the original image data to remove the private information. The transformed image data includes the distorted portions to prevent access to the private information. However, the distorted portions of the video include sufficient image detail to discern occurrence of the activity in the retail environment.01-03-2013
20130265433CART INSPECTION FOR SUSPICIOUS ITEMS - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer.10-10-2013
20140168351Telepresence Device Communication and Control System - A telepresence unit control and communication methods are disclosed. The telepresence unit enables a virtual presence of a controller, a human being, located away from the telepresence unit. The telepresence unit control and communication methods enable a mechanical motion control of the telepresence unit by utilizing a visual communication between the telepresence unit and a computer administered by the controller. The telepresence unit utilizes a mobile computing device to establish the visual communication channel to the computer via the internet. Once the visual communication channel is established, the present invention provides a video modification as means of controlling and communicating with the telepresence unit.06-19-2014
20140176719VERIFICATION OF FRAUDULENT ACTIVITIES AT A SELF-CHECKOUT TERMINAL - A verification method of a fraudulent activity taking place at a self-checkout terminal is disclosed. The method verifies the fraudulent activity by confirming an incident of the fraudulent activity with multiple data generated by monitoring the transaction area and the bagging area of the self-checkout terminal. A human validation is optionally performed to verify machine-identified incidents.06-26-2014
20150049912IMAGE PROCESSING TO PREVENT ACCESS TO PRIVATE INFORMATION - A processing resource receives original image data by a surveillance system. The original image data captures at least private information and occurrence of activity in a monitored region. The processing resource applies one or more transforms to the original image data to produce transformed image data. Application of the one or more transforms sufficiently distorts portions of the original image data to remove the private information. The transformed image data includes the distorted portions to prevent access to the private information. However, the distorted portions of the video include sufficient image detail to discern occurrence of the activity in the retail environment.02-19-2015
20150187080CART INSPECTION FOR SUSPICIOUS ITEMS - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer.07-02-2015
20150193780FRAUDULENT ACTIVITY DETECTION AT A BARCODE SCANNER BY VERIFYING VISUAL SIGNATURES - System and method for detecting a fraudulent activity at a barcode scanner is disclosed. The method issues an alert when the fraudulent activity is confirmed by comparing the visual signature of the item being transacted over the checkout terminal to the model visual signature. The model visual signature is obtained by averaging the collection of visual signature of the item gathered over a period of time. A human validation via a remote processor is employed to confirm the fraudulent activity verified by a computer.07-09-2015
20160078300METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS - A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.03-17-2016

Patent applications by Malay Kundu, Lexington, MA US

Namita Kundu, Columbia, MD US

Patent application numberDescriptionPublished
20130017225NATURAL PLANT PRODUCTS FOR CONTROL OF CANCER METASTASIS - The invention provides compositions comprising soluble extracts or isolated polypeptides from the edible roots of the plant 01-17-2013

Rithik Kundu, Lexington, MA US

Patent application numberDescriptionPublished
20140168351Telepresence Device Communication and Control System - A telepresence unit control and communication methods are disclosed. The telepresence unit enables a virtual presence of a controller, a human being, located away from the telepresence unit. The telepresence unit control and communication methods enable a mechanical motion control of the telepresence unit by utilizing a visual communication between the telepresence unit and a computer administered by the controller. The telepresence unit utilizes a mobile computing device to establish the visual communication channel to the computer via the internet. Once the visual communication channel is established, the present invention provides a video modification as means of controlling and communicating with the telepresence unit.06-19-2014

Sabuj Kumar Kundu, Rochester, NY US

Patent application numberDescriptionPublished
20100236984SUPPORTED IRIDIUM CATALYSTS - A method of converting at least one first alkane to a mixture of at least one low molecular weight alkane (optionally also including additional lower and/or higher molecular weight alkanes) and at least one high molecular weight alkane, comprises: reacting a first alkane in the presence of dual catalyst system comprising a first catalyst (i.e., a hydrogen transfer catalyst) and a second catalyst (i.e., a metathesis catalyst) to produce a mixture of low and high molecular weight alkanes.09-23-2010
20130123097SUPPORTED IRIDIUM CATALYSTS - A method of converting at least one first alkane to a mixture of at least one low molecular weight alkane (optionally also including additional lower and/or higher molecular weight alkanes) and at least one high molecular weight alkane, comprises: reacting a first alkane in the presence of dual catalyst system comprising a first catalyst (i.e., a hydrogen transfer catalyst) and a second catalyst (i.e., a metathesis catalyst) to produce a mixture of low and high molecular weight alkanes.05-16-2013

Samar Kumar Kundu, Libertyville, IL US

Patent application numberDescriptionPublished
20080274489Methods for detecting organisms and enzymatic reactions using raman spectroscopy - The present disclosure provides systems for the rapid and sensitive detection of organisms and molecules in samples. Reactants that produce Raman-active products are used in combination with Raman light scattering. The present disclosure can also be used to measure enzyme-kinetics.11-06-2008
20100041016METHODS FOR DETECTING ORGANISMS AND ENZYMATIC REACTIONS USING RAMAN SPECTROSCOPY AND AROMATIC COMPOUNDS COMPRISING PHOSPHATE - The present disclosure provides systems for the rapid and sensitive detection of organisms and molecules in samples. Reactants that produce Raman-active products are used in combination with Raman light scattering. Such compounds may comprise phosphates permitting the detection of phosphatases. The present disclosure can also be used to measure enzyme-kinetics.02-18-2010
20110183316METHODS FOR DETECTING ORGANISMS AND ENZYMATIC REACTIONS USING RAMAN SPECTROSCOPY - The present disclosure provides systems for the rapid and sensitive detection of organisms and molecules in samples. Reactants that produce Raman-active products are used in combination with Raman light scattering. The present disclosure can also be used to measure enzyme-kinetics.07-28-2011
20150218615METHODS FOR DETECTING ORGANISMS AND ENZYMATIC REACTIONS USING RAMAN SPECTROSCOPY AND AROMATIC COMPOUNDS COMPRISING PHOSPHATE - The present disclosure provides systems for the rapid and sensitive detection of organisms and molecules in samples. Reactants that produce Raman-active products are used in combination with Raman light scattering. Such compounds may comprise phosphates permitting the detection of phosphatases. The present disclosure can also be used to measure enzyme-kinetics.08-06-2015

Patent applications by Samar Kumar Kundu, Libertyville, IL US

Sambhu N. Kundu, Richland, WA US

Patent application numberDescriptionPublished
20110232752Organic-Inorganic Complexes Containing a Luminescent Rare earth-Metal Nanocluster and an Antenna Ligand, Luminescent Articles, and Methods of Making Luminescent Compositions - Luminescent compositions are described comprising lanthanide-containing nanoclusters comprising lanthanide atoms bonded to at least one semimetal or transition metal via an oxygen or sulfur atom. Novel compositions include an antenna ligand complexed with the nanoclusters. The rare earth-metal nanoclusters are in the size range of 1 to 100 nm. Articles, such as solar cells, are described in which the nanoclusters (with or without antenna ligands) are dispersed in a polymer matrix. Novel methods of making luminescent films are also described.09-29-2011

Subhas Kundu, Tappan, NY US

Patent application numberDescriptionPublished
20120172338TOPICAL GEL FORMULATION COMPRISING ORGANOPHOSPHATE INSECTICIDE AND ITS PREPARATION THEREOF - The present invention provides a topical gel pharmaceutical formulation of insecticide suitable for treating an ectoparasite in a mammal, comprising: a) about 0.1-10% by weight of an insecticide; b) at least about 75% by weight of an organic solvent selected from the group consisting of a lower alkyl alcohol, a ketone, a glycol and a mixture thereof, wherein the organic solvent contains at least about 40% by weight of the lower alkyl alcohol; and c) at least one polymer selected from the group consisting of a cellulosic polymer, acrylates, methacrylates, and polyvinyl pyrrolidone. The present topical formulations encompass a non-flammable solvent for malathion effective in killing head lice. The present gel pharmaceutical formulation preferably contains malathion and optionally contains isopropyl myristate. The present invention further provides a process of preparing as well as a method of treating ectoparasites in a mammal using the same.07-05-2012

Sudeep Kundu, New York, NY US

Patent application numberDescriptionPublished
20140056920METHODS FOR TREATING OR PREVENTING ASTHMA BY ADMINISTERING AN IL-4R ANTAGONIST - The present invention provides methods for treating or preventing asthma and associated conditions in a patient. The methods of the present invention comprise administering to a subject in need thereof a therapeutic composition comprising an interleukin-4 receptor (IL-4R) antagonist, such as an anti-IL-4R antibody.02-27-2014
20140072583METHODS FOR TREATING ATOPIC DERMATITIS BY ADMINISTERING AN IL-4R ANTAGONIST - The present invention provides methods for treating atopic dermatitis (AD). Also provided are methods for improving one or more AD-associated parameter(s), and methods for decreasing the level of at least one AD-associated biomarker in a subject in need thereof. The methods of the present invention comprise administering to a subject in need thereof a pharmaceutical composition comprising an interleukin-4 receptor (IL-4R) antagonist such as an anti-IL-4R antibody.03-13-2014

Sudipta Kundu, Hillsboro, OR US

Patent application numberDescriptionPublished
20100088680METHODS AND SYSTEMS FOR REDUCING VERIFICATION CONDITIONS FOR CONCURRENT PROGRAMS USING MUTUALLY ATOMIC TRANSACTIONS - Methods and systems for generating verification conditions and verifying the correctness of a concurrent system of program threads are described. The methods and systems determine and employ mutually atomic transactions to reduce verification problem sizes and state space for concurrent systems. The embodiments provide both an adequate and an optimal set of token-passing constraints for a bounded unrolling of threads.04-08-2010
20140359545EQUIVALENCE CHECKING USING STRUCTURAL ANALYSIS ON DATA FLOW GRAPHS - A design is verified by using equivalence checking to compare a word-level description of the design to a bit-level description of the design. A word-level data flow graph (DFG) based on the word-level description and a bit-level DFG is obtained. Structural analysis is used to reduce the graphs and partition them into smaller portions for the equivalence checking. The analysis includes searching the bit-level DFG to find partial-product encoding and removing redundancy from the bit-level DFG. A reference model with architectural information from the bit-level DFG is created based on the word-level DFG. The reference model is reduced and equivalence checked against the bit-level DFG to determine if the word-level description is equivalent to the bit-level description.12-04-2014

Sumantra Kundu, Arlington, TX US

Tribikram Kundu, Tucson, AZ US

Patent application numberDescriptionPublished
20100010781UNIVERSAL METHOD FOR MODELING THE INTERACTIONS BETWEEN AT LEAST ONE WAVE AND AT LEAST ONE OBJECT, THE SURFACE OF EACH OBJECT DEFINING AN INTERFACE BETWEEN AT LEAST TWO MEDIA - The present invention relates to a method for modeling the interactions within a system between at least one object. The surface of each object defines an interface between at least two media. The set of elementary characteristic functions are chosen that correspond to the field of application in question. The physical properties of each medium considered composing the system are defined. Each object of the system is created by modeling it as a mesh and at least one elementary point source is associated with either side of each mesh element. The type of boundary conditions are determined for each interface. The global matrix for the interactions between the various objects is constructed, depending on the type of boundary conditions, the properties of the media and on the configuration of the system. The global matrix is inverted. The inverted matrix is multiplied by a column matrix containing the values of the excitation boundary conditions. A column matrix is obtained that contains the values of all of the elementary point sources. At every point in the system, the physical quantities representative of the interactions are calculated and an analytical model of the interactions within the system is obtained.01-14-2010
Website © 2016 Advameg, Inc.