Vedula, US
Krishna C. Vedula, Chanhassen, MN US
Patent application number | Description | Published |
---|---|---|
20150201987 | QUICK-LOCK DRIVER FOR A BONE SCREW - A driver instrument for engaging and transferring rotational torque to a bone screw assembly which includes a shaft and sleeve adapted to engage and couple the bone screw assembly into a single coaxial unit while the bone screw assembly is being driven into a bone and then to release the bone screw assembly from the driver instrument. The driver instrument includes an elongate shaft, a sleeve, and bone screw assembly engaging features on the elongate shaft and/or the sleeve. | 07-23-2015 |
20150282844 | UNIPLANAR BONE SCREW - A uniplanar bone anchor including a housing and a bone screw is provided. The lower region of the housing defines mating elements that mate with engaging elements on the bone screw to limit movement of the housing relative to the bone screw to a single plane. | 10-08-2015 |
Narayana Rao Vedula, Minneapolis, MN US
Patent application number | Description | Published |
---|---|---|
20140268986 | Read Only Memory Array Architecture and Methods of Operation - An encoded ROM array structure couples a first one of a first set of bitlines to a second one of a second set of bitlines through a transistor when the wordline connected to the gate terminal of that transistor is asserted. This encoded arrangement can be extended to any number of encoded bitlines, e.g., 2, 4, 8, 16, and so on. Each of the first plurality and second sets of bit lines are coupled to circuits for charging and discharging the bitlines. To read data from the first set of bit lines, the second set of bitlines is discharged, and vice versa. | 09-18-2014 |
Phanindranath Vedula, Macomb, MI US
Patent application number | Description | Published |
---|---|---|
20100235157 | SYSTEM AND METHOD FOR SOA-BASED WIRE HARNESS DEVELOPMENT - A method for operating a service oriented architecture (SOA) based wire harness system, a corresponding system, and a machine readable medium. The method includes storing wire harness data in a wire harness data model in a wire harness data processing system, interactively communicating the wire harness data with an electronic computer aided design (ECAD) system and a mechanical computer aided design (MCAD) system through the SOA interface, and storing the wire harness data in the wire harness data model. | 09-16-2010 |
Phanindranath Vedula, Troy, MI US
Patent application number | Description | Published |
---|---|---|
20090064187 | SYSTEM AND METHOD FOR DATA MANAGEMENT OF EMBEDDED SYSTEMS - A system, method, and computer program for managing embedded component information for a product design in a PLM environment, comprising displaying at least one message object; and associating said at least one message object with a signal object, and appropriate means and computer-readable instructions. | 03-05-2009 |
Ravikiran Vedula, Belmont, CA US
Patent application number | Description | Published |
---|---|---|
20120023129 | ENTERPRISE COLLABORATION WITH REUSABLE CONTENT - Embodiments of the invention provide systems and methods for a collaboration environment in which a number of different workspaces can use the same, reusable content. According to one embodiment, a method of providing collaboration using reusable content can comprise identifying a content item to be included in a first workspace of a plurality of workspaces of a collaboration environment. A first proxy representing the identified content item can be created. The first proxy can have a unique identifier within the first workspace. A mapping table record can be created for the first proxy that links the first proxy to the content item. Additionally, a cross-reference table record can be created for the first proxy. The cross-reference record can identify a relationship of the first proxy to another content item in the first workspace. | 01-26-2012 |
Ravi R. Vedula, North Ridgeville, OH US
Patent application number | Description | Published |
---|---|---|
20090100723 | Soft, Elastic, Plasticizer-Free Thermoplastic Polyurethane And Process To Synthesize The Same - The present invention discloses a thermoplastic polyurethane which is comprised of the reaction product of (1) a hydroxyl terminated intermediate, (2) a polyisocyanate, and (3) a glycol chain extender selected from the group consisting of ethylene glycol and propylene glycol; wherein the hydroxyl terminated intermediate is selected from the group consisting of hydroxyl terminated polyether intermediates and hydroxyl terminated polyester intermediates; wherein the hydroxyl terminated intermediate is comprised of repeat units that are derived from a branched glycol or is comprised of at least 2 different repeating units; wherein the thermoplastic polyurethane has a weight average molecular weight of at least 100,000 Daltons; wherein the thermoplastic polyurethane includes hard segments that are the reaction product of the polyisocyanate and the glycol chain extender; and wherein the hard segments represent from 10 to 40 weight percent of the total weight of the thermoplastic polyurethane. | 04-23-2009 |
20110183567 | High strength Non-Woven Elastic Fabrics - Elastic non-woven fabrics are disclosed which are made in a melt blown process or a spunbond process. The fabric is made from a thermoplastic polyurethane polymer mixed with a crosslinking agent to give high strength elastic non-woven fabric. The crosslinking agent is added to the polymer melt prior to the melt passing through the die which forms the individual fibers. Further processing the non-woven is also disclosed. | 07-28-2011 |
20110305902 | High Strength Constant Compression Elastic Fibers And Fabrics Thereof - The present invention relates to high strength fabrics made thereof from thin gauge constant compression elastic fibers. Elastic fibers are disclosed which have a relatively flat modulus curve, for example between 100% and 200% elongation. Garments made with the constant compression elastic fibers have a more comfortable feel to the wearer. The garments are also resistant to puncture due to the high strength fabric made with the elastic fibers. | 12-15-2011 |
20120001362 | Spin pack assembly - A spin pack assembly for use in melt spinning elastic fibers. The spin pack assembly includes a circular breaker plate having a center aperture and several circular patterns of apertures with each circular pattern having a plurality of apertures. Each circular pattern is located concentrically about an axis of the center aperture. The apertures in the outer circular patterns have a greater diameter than the apertures in the inner circular patterns. The spin pack assembly also has a spinneret plate where the exit aperture of the spinneret plate is recessed in the body of the spin pack assembly. | 01-05-2012 |
20130273285 | Elastomer Resins, Fibers And Fabrics Thereof, And Uses Thereof - The present invention relates to elastomeric resins, fibers made from said resins, fabrics made with said fibers, and applications and uses for the resins, fibers and fabrics. The elastomer resins of the invention provide high strength fibers and well balanced fabrics with good physical properties and chemical resistance, making them attractive for use in various applications that use elastic fibers and fabrics. | 10-17-2013 |
20140101825 | Elastomer Fibers And Methods Of Making And Using Thereof - The invention relates to a fiber excellent in cool contact feeling which is excellent in hand and skin touch and capable of preventing unpleasant feeling in the wet state while also having excellent elasticity. The invention also relates to fabric, clothing, and underwear excellent in cool contact feeling and obtainable by using said fiber as well as the methods of making the fibers and articles thereof. | 04-17-2014 |
20150275402 | DYEABLE AND FLAME-RETARDED THERMOPLASTIC POLYURETHANE FIBERS - The invention relates to a thermoplastic polyurethane fibers, and process of making the same, where the described fiber has good dyeability, and in some embodiments, good flame retardant properties. Such fibers are made from a composition that includes (a) a thermoplastic polyurethane itself comprising the reaction product of: (i) one or more polyols, (ii) one or more diisocyanates, (iii) one or more chain extenders, (iv) optionally one or more crosslinking agents, and (v) one or more functional modifiers wherein each said functional modifier is a reaction product of an aminodiol and a Bronsted acid. | 10-01-2015 |
20160053408 | HIGH STRENGTH CONSTANT COMPRESSION ELASTIC FIBERS AND FABRICS THEREOF - The present invention relates to high strength fabrics made thereof from thin gauge constant compression elastic fibers. Elastic fibers are disclosed which have a relatively flat modulus curve, for example between 100% and 200% elongation. Garments made with the constant compression elastic fibers have a more comfortable feel to the wearer. The garments are also resistant to puncture due to the high strength fabric made with the elastic fibers. | 02-25-2016 |
Ravi S. Vedula, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130007710 | Deploying Environments For Testing By Providing Instantaneous Availability Of Prebuilt Environments - Environments for testing are deployed. A library of different topology groupings is provided. An interface is presented to a user for receiving environment definitions. Elements from the library of different topology groupings are automatically provided to the user for creating a test environment according to the received environment definitions. The platform delivers fully configured instantaneous topology deployments of all flavors for product development and testing efforts. The topology deployment service platform is used to create reliable topologies of varying layers of complexity, varying machine providers, different roles, different product builds, integration with partners and varying product configurations. The ability to launch and create multiple test and development environments trivially in an automated reliable fashion allows complicated customer scenarios and configurations to be deployed. | 01-03-2013 |
Shanti Swarup Vedula, Boyds, MD US
Patent application number | Description | Published |
---|---|---|
20120243410 | SYSTEM AND METHOD FOR PROVIDING QUALITY OF SERVICE OVER DEDICATED LOCAL LOOP NETWORKS - An apparatus, method, and system for quality of service over dedicated local loop networks is provided. Information regarding uplink and downlink speeds, and information regarding WAN interface protocol and encapsulation mode, is received from a network device. A link throughput limit is calculated based on the uplink speed of the network device, and a link throughput limit is set based on the calculated uplink throughput limit. An uplink network protocol overhead of the network device is calculated based on the WAN interface protocol and encapsulation mode of the uplink device and is factored in upstream available bandwidth calculations. Communication data size(s) are set based on the calculated uplink network protocol overhead. The downlink throughput limit is set to match the downlink speed based on the downlink speed and WAN network protocol overhead. The WAN network protocol overhead is factored in the downstream available bandwidth calculations and communication data sizes. | 09-27-2012 |
20120246305 | SYSTEM AND METHOD FOR MANAGEMENT OF COTS DEVICES IN MANAGED NETWORKS BASED ON DEVICE AUTO-DETECTION - A system and method for managing COTS devices based on device auto-detection and identification is provided. A network device on a managed network is identified, wherein the network device is identified as a one of a list of one or more network device types supported by the managed network and included in one or more configuration files, and wherein the one or more configuration files further include a list of one or more respective SNMP variables to be monitored for each of the network device types. The respective listing of SNMP variables to be monitored and/or configured is extracted from the one or more configuration files for the identified network device type. A request is then generated to monitor and/or configure the extracted SNMP variables to be monitored for the network device. | 09-27-2012 |
Srinivas Vedula, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20110047622 | SYSTEM AND METHOD FOR CALL PATH ENFORCEMENT - Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters. | 02-24-2011 |
20130182842 | SYSTEM AND METHOD FOR KEY SPACE DIVISION AND SUB-KEY DERIVATION FOR MIXED MEDIA DIGITAL RIGHTS MANAGEMENT CONTENT - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key. | 07-18-2013 |
Srinivas Vedula, Orem, UT US
Patent application number | Description | Published |
---|---|---|
20090113523 | TECHNIQUES FOR FLEXIBLE RESOURCE AUTHENTICATION - In various embodiments, techniques for flexible resource authentication are provided. A principal attempts to login to a target resource using first credentials. The target resource does not recognize the first credentials and in response thereto forwards the first credentials to an identity service. The identity service authenticates the principal via the first credentials and supplies second credentials to the target resource. The target resource recognizes and authenticates the second credentials and grants access to the principal. | 04-30-2009 |
20090150677 | TECHNIQUES FOR REAL-TIME ADAPTIVE PASSWORD POLICIES - Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern. | 06-11-2009 |
20090150971 | TECHNIQUES FOR DYNAMIC GENERATION AND MANAGEMENT OF PASSWORD DICTIONARIES - Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable. | 06-11-2009 |
20090171953 | TECHNIQUES FOR RECOGNIZING MULTIPLE PATTERNS WITHIN A STRING - Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed. | 07-02-2009 |
20090172788 | TECHNIQUES FOR CREDENTIAL STRENGTH ANALYSIS VIA FAILED INTRUDER ACCESS ATTEMPTS - Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation. | 07-02-2009 |
20090241178 | CARDSPACE HISTORY VALIDATOR - Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be verified. Verification can be accomplished by comparing the last time the client sent the security token to the relying party with the last time the relying party received the security token from the client. If the last use of the security token is not verified, the possibility exists that the security token has been fraudulently used by a third party. | 09-24-2009 |
20140189826 | TECHNIQUES FOR DYNAMIC GENERATION AND MANAGEMENT OF PASSWORD DICTIONARIES - Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable. | 07-03-2014 |
Srinivas Vedula, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20130124866 | CLIENT-SERVER SYSTEM WITH SECURITY FOR UNTRUSTED SERVER - In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user computers (clients), a method is provided for enhancing security in the context of digital rights management (DRM) where the server is an untrusted server that may not be secure, but the client is secure. This method operates to authenticate the server to the client and vice versa to defeat hacking attacks intended to obtain confidential information. Values passed between the server and the client include encrypted random numbers, authentication values and other verification data generated using cryptographic techniques including double encryption. | 05-16-2013 |
20130125242 | CLIENT-SERVER VERSION CONTROL SYSTEM FOR SOFTWARE APPLICATIONS - A software version control system manages versioned applications in a client-server computing system environment. Thereby this is a management system for computer application (software) distribution where a number of client devices coupled to a server may be executing different versions of a particular computing application. The system manages updates to the applications and enforces rules or policies to use the most recent version whenever possible. | 05-16-2013 |
Usha Vedula, Racine, WI US
Patent application number | Description | Published |
---|---|---|
20110314020 | CHEMICAL ADDITIVE INGREDIENT PALETTE - Disclosed are methods for developing authorized chemical palettes for formulating products with reduced adverse environmental and/or health concerns, and advising the public to a greater extent regarding the ingredients of products formulated using these palettes. Also disclosed are computer systems to implement such methods. | 12-22-2011 |
Venkata R. Vedula, Unionville, CT US
Patent application number | Description | Published |
---|---|---|
20140169971 | ADDITIVELY MANUFACTURED IMPELLER - An impeller including a blade section, a shroud section, and a hub is made of a monolithic structure. The impeller is made by loading a 3D image file into an additive manufacturing device, using it to generate 2D files which correspond to a plurality of cross-sectional layers of the impeller, and solidifying corresponding portions of pulverant material layers to create the impeller. | 06-19-2014 |
20140284038 | HEAT EXCHANGER DESIGN AND FABRICATION - A method of forming a heat exchanger for use with a rotating component configured to rotate about an axis of rotation is provided including generating a stereolithography file of the surface geometry of the heat exchanger. The surface geometry of the heat exchanger includes a cylindrical base having a plurality of fins extending generally radially therefrom. The surface geometry defined in the stereolithography file is ‘sliced’ into a plurality of axisymmetric layers, perpendicular to the axis of rotation. Energy from an energy source is applied to a powdered material causing the powdered material to fuse and form the plurality of axisymmetric thin layers. Each of the axisymmetric thin layers is integrally formed with an adjacent axisymmetric thin layer to create a unitary heat exchanger. | 09-25-2014 |
Vivekananda Vedula, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20160098558 | SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SECURITY VERIFICATION OF THIRD PARTY INTELLECTUAL PROPERTY CORES - An exemplary system, method and computer-accessible medium for detecting the presence of a Trojan(s) in a circuit(s), can include, for example, receiving information related to a property(s) configured to determine the presence of the Trojan(s), and determining the presence of the Trojan(s) based on the property(s) and a design(s) of the circuit(s) using a bounded model checking tool. | 04-07-2016 |
20160098565 | SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SECURITY VERIFICATION OF THIRD PARTY INTELLECTUAL PROPERTY CORES - An exemplary system, method and computer-accessible medium for detecting the presence of a Trojan(s) in a circuit(s), can include, for example, receiving information related to a property(s) configured to determine the presence of the Trojan(s), and determining the presence of the Trojan(s) based on the property(s) and a design(s) of the circuit(s) using a bounded model checking tool. | 04-07-2016 |
Vivekananda M. Vedula, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20140006875 | SYSTEMS AND METHODS FOR ANALYZING TRANSACTIONS IN A COMPUTER SYSTEM | 01-02-2014 |