Shekhar
Amit Shekhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120278466 | METHOD AND APPARATUS FOR MANAGING INTERNET CONNECTION SHARING - A method and apparatus for managing Internet Connection Sharing (ICS) in a primary mobile device are provided. The method includes establishing a device management session with a service provider; receiving an Internet connection-sharing criterion from the service provider; and checking the Internet connection-sharing criterion upon receiving an Internet connection sharing request from a peer mobile device. | 11-01-2012 |
Kiran G. Shekhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150288523 | METHOD OF PROGRAMMING A SMART CARD, COMPUTER PROGRAM PRODUCT AND PROGRAMMABLE SMART CARD - There is provided a method of programming a smart card, said smart card comprising a secure element and a microcontroller unit which is connected to said secure element, the method comprising: (a) the secure element receives a firmware image from a host device; (b) the secure element validates the firmware image; (c) the secure element forwards the firmware image to the microcontroller unit if the firmware image is valid; (d) the microcontroller unit receives the firmware image from the secure element; (e) the microcontroller unit extracts firmware from the firmware image; and (f) the microcontroller unit installs the firmware in a memory unit of said smart card. Furthermore, a corresponding computer program product and a corresponding programmable smart card are disclosed. | 10-08-2015 |
Polisetti Shekhar, Nereducharla IN
Patent application number | Description | Published |
---|---|---|
20100280067 | INHIBITORS OF ACETYL-COA CARBOXYLASE - The present invention relates to compounds that act as acetyl-CoA carboxylase (ACC) inhibitors. The invention also relates to methods of preparing the compounds, compositions containing the compounds, and to methods of treatment using the compounds. | 11-04-2010 |
Rajiv Chandra Shekhar, Pinjarra Hills AU
Patent application number | Description | Published |
---|---|---|
20150247888 | SPARK TESTING APPARATUS - The invention provides a method and apparatus for electronically testing the safety of sources of energy such as electrical circuits, in explosive atmospheres such as high risk mining situations, using an electronic spark tester (EST) in place of the known mechanical spark test apparatus (STA). The EST typically uses an analogue subsystem ( | 09-03-2015 |
Rajiv Chandra Shekhar, Brisbane AU
Patent application number | Description | Published |
---|---|---|
20120136542 | MEASUREMENT OF BULK DENSITY OF THE PAYLOAD IN A DRAGLINE BUCKET - In particular embodiments of the technology, the bulk density of the payload in the bucket of a large electric dragline is measured during the carry phase of dragline operation by scanning the loaded bucket using a boom mounted scanner to provide data relating to the volume of the loaded bucket. Suitable methods can further include calculating the volume enclosed by the surface of the payload and the known base and sides of the bucket to give payload volume, and dividing the payload volume into payload weight data derived from rope length and motor current data to give the payload bulk density. Methods of screening data points originating from surfaces other than the bucket and payload, and methods of dealing with bucket ope and sway are also described and claimed. | 05-31-2012 |
Ravi Shekhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140333460 | MEMORYLESS SLIDING WINDOW HISTOGRAM BASED BIST - A chip with a built-in self-test (BIST) component capable of testing the linearity of an ADC is described herein. The BIST component uses hardware registers to facilitate a sliding histogram technique to save space on the chip. A subset of detected digital codes are analyzed, and DNL and INL calculations are performed by a controller to determine whether any of the digital codes in the subset exceed maximum or minimum DNL and INL thresholds. New digital codes being detected by the ADC are added to the subset as lower-value digital codes are pushed out of the subset, maintaining the same number of digital codes being analyzed as the subset moves from lower codes detected during lower voltages to higher codes detected at higher voltages. A synchronizer and pointer ensure that the subset moves through the digital codes at the same rate as the analog input ramp source. | 11-13-2014 |
Ravi Shekhar, Pune IN
Patent application number | Description | Published |
---|---|---|
20150334027 | SYSTEM AND METHOD FOR TRANSPORTING INFORMATION TO SERVICES IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include receiving a packet for a subscriber at a gateway, wherein the gateway includes a local policy anchor for interfacing with one or more policy servers and one or more classifiers for interfacing with one or more service chains, each service chain including one or more services accessible by the gateway; determining a service chain to receive the subscriber's packet; appending the subscriber's packet with a header, wherein the header includes, at least in part, identification information for the subscriber and an Internet Protocol (IP) address for the local policy anchor; and injecting the packet including the header into the service chain determined for the subscriber. | 11-19-2015 |
20150334595 | SYSTEM AND METHOD FOR TRANSPORTING INFORMATION TO SERVICES IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include receiving a packet for a subscriber at a gateway, wherein the gateway includes a local policy anchor for interfacing with one or more policy servers and one or more classifiers for interfacing with one or more service chains, each service chain including one or more services accessible by the gateway; determining a service chain to receive the subscriber's packet; appending the subscriber's packet with a header, wherein the header includes, at least in part, identification information for the subscriber and an Internet Protocol (IP) address for the local policy anchor; and injecting the packet including the header into the service chain determined for the subscriber. | 11-19-2015 |
Saurabh Shekhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150134442 | BEST MONETARY DISCOUNT DETERMINATION METHODS AND SYSTEMS - Methods and systems are described that determine the promotion(s) offering the best monetary discount available to a customer. The methods and systems can be used at the time of checkout during a retail purchase or prior to checkout to inform the customer about the best deal that may be available based on alternative proposed purchases. One method can include defining a promotion combinability matrix that identifies combination logic of the available promotions. In addition, a priority set of the available promotions is established that identifies the priority in which the promotions will be applied. The promotion combinability matrix and the priority set are then used to determine the best monetary discount that is available to the customer. | 05-14-2015 |
Sisir Shekhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150269032 | BACKING UP DATA TO CLOUD DATA STORAGE WHILE MAINTAINING STORAGE EFFICIENCY - Technology is disclosed for backing up data to and recovering data from a destination storage system that stores data in a format different form that of a primary storage system (“the technology”). A replication stream having the data of multiple files, metadata of the files, and reference maps including a mapping of the corresponding file to a portion of the data of the corresponding file is generated at the primary storage system. The replication stream is sent to a parser to map or convert the data, the files, and the reference maps to multiple storage objects in a format the destination storage system is configured to store. Various types of storage objects are generated, including a first type of the storage objects having the data, a second type of storage objects storing the reference maps, and a third type of the storage objects storing metadata of the files. | 09-24-2015 |
20150350315 | ZERO COPY VOLUME RECONSTRUCTION - Examples described herein include a data migration system for migrating data between different data storage environments. The data migration system creates a first volume on a first storage system, and creates a logical unit within the first volume. The data migration system then creates a virtual volume on a virtual storage system associated with a second storage system, wherein data stored in the virtual volume is backed by the logical unit on the first storage system. The data migration system then replicates, on the virtual volume, a set of data stored on the second storage system. Upon replicating the set of data onto the virtual volume the virtual storage system may automatically create a copy of the corresponding data in the logical unit of the first volume. | 12-03-2015 |
Sitanshu Shekhar, Farìdabad, Haryana IN
Patent application number | Description | Published |
---|---|---|
20150352949 | SIDE-BY-SIDE UTILITY VEHICLE - A utility vehicle ( | 12-10-2015 |
Sudhanshu Shekhar, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20150264084 | SYSTEMS AND METHODS FOR PROTECTING ORGANIZATIONS AGAINST SPEAR PHISHING ATTACKS - A computer-implemented method for protecting organizations against spear phishing attacks may include (1) searching a plurality of websites for user profiles belonging users who are affiliated with an organization and who have access to at least one privileged computing resource controlled by the organization, (2) retrieving, from the user profiles, personal information describing the users, (3) determining, based on the personal information, that a portion of the user profiles belongs to an individual user with access to the privileged computing resource, (4) identifying at least one phishing attack risk factor in the user profiles that belong to the individual user, and (5) assessing, based at least in part on the phishing attack risk factor, a risk of a phishing attack targeting the individual user to illegitimately gain access to the privileged computing resource. Various other methods, systems, and computer-readable media are also disclosed. | 09-17-2015 |
Tushar Shekhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130238385 | System and Method for Solving Large Scale Supply Chain Planning Problems with Integer Constraints - A system and method is disclosed for solving supply chain planning problems. The system includes a database that stores data representing a planning problem of a supply chain network and a computer that accesses the planning problem of the supply chain network stored in the database and models the planning problem as a network of nodes and edges. The computer further generates a hierarchical linear programming solution of the planning problem and applies advanced heuristics to the generated hierarchical linear programming solution. The computer still further formulates a mixed integer program to generate an optimized global hierarchical solution and stores the generated optimized global hierarchical solution in the database. | 09-12-2013 |