Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Vinod

Vinod Aanupam, Mountain View, CA US

Patent application numberDescriptionPublished
20140324582SOCIAL NETWORK ENHANCED CONTENT ITEMS RESPONSIVE TO SEARCH QUERIES - Methods for identifying social network users to display with an advertisement in response to a search query are provided. In one aspect, a method includes receiving a search query from a user, the user having a user presence on a social network, and identifying at least one advertisement responsive to the search query, the at least one advertisement associated with an entity having a social presence on the social network. The method also includes identifying another user of the social network that has a mutual user connection with the user on the social network and has interacted with the social presence on the social network, and providing, for display and in response to the search query, the at least one advertisement responsive to the search query, an identification of the other user, and an indicator of the interaction of the other user. Systems and machine-readable media are also provided.10-30-2014

Vinod Anupam, Bridgewater, NJ US

Patent application numberDescriptionPublished
20100208874SYSTEM AND METHOD FOR DELIVERING CONTENT TO A USER OF A TELEPHONY DEVICE - A system and method for utilizing information exchanged during an initiation phase (i.e., the “ringing” phase) of a conventional telephone connection request received from a telephony device, in order to identify and provide a user with content or enhanced services. In a convention telephone call the connection request includes information that identifies the user and/or telephony device that placed the phone call (the originating number) and the dialed phone number (the signaling number). The connection request is rejected and the call is terminated Prior to termination of the call the originating dumber and/or signaling number are extracted and used to identify a task that is desired by a user; content associated with the task is delivered to the user.08-19-2010

Patent applications by Vinod Anupam, Bridgewater, NJ US

Vinod Arjun, Mountain View, CA US

Patent application numberDescriptionPublished
20130091352Techniques to Classify Virtual Private Network Traffic Based on Identity - Techniques are provided for obtaining first and second digital certificates from a certificate authority database for establishing a secure exchange between network devices. The first digital certificate contains identity information of a first network device, and the second digital certificate contains classification information of the first network device. In one embodiment, a secure key exchange is initiated with the second network device, and the first and second digital certificates are transmitted as a part of the secure key exchange to the second network device. In another embodiment, the first and second digital certificates are received by an intermediate network device. The first digital certificate is encrypted and is not evaluated by the intermediate network device. The second digital certificate is evaluated for classification information of the first network device. Source information associated with the first network device is stored, and encrypted traffic is processed between the network devices.04-11-2013
20150067337Techniques to Classify Virtual Private Network Traffic Based on Identity - Techniques are provided for obtaining first and second digital certificates from a certificate authority database for establishing a secure exchange between network devices. The first digital certificate contains identity information of a first network device, and the second digital certificate contains classification information of the first network device. In one embodiment, a secure key exchange is initiated with the second network device, and the first and second digital certificates are transmitted as a part of the secure key exchange to the second network device. In another embodiment, the first and second digital certificates are received by an intermediate network device. The first digital certificate is encrypted and is not evaluated by the intermediate network device. The second digital certificate is evaluated for classification information of the first network device. Source information associated with the first network device is stored, and encrypted traffic is processed between the network devices.03-05-2015

Vinod Atal, Hyderabad IN

Patent application numberDescriptionPublished
20130198739Validation of Business Continuity Preparedness of a Virtual Machine - Techniques for validating business continuity preparedness of a virtual machine are described herein. The techniques may include executing a workload on a virtual machine and replicating the workload to another virtual machine. The replication may include generating one or more logs indicating changes that have occurred on the virtual machine and sending the one or more logs to the other virtual machine. Upon initiation of a failover, the workload may stop execution on the virtual machine and a log may be sent to the other virtual machine. The log may indicate changes occurring on the virtual machine to a point in time when execution of the workload stopped. The log may be stored to the other virtual machine. The workload may continue execution on the other virtual machine and may be replicated to the virtual machine.08-01-2013
20130346803RELIABLY TESTING VIRTUAL MACHINE FAILOVER USING DIFFERENCING DISKS - In one embodiment, a virtual machine replication system may test a replica data set while continuing to replicate a primary data set. A data storage 12-26-2013

Vinod Binyala, Richmond, VA US

Patent application numberDescriptionPublished
20130085801Supply Chain Performance Management Tool Having Predictive Capabilities - A method for providing a supply chain management tool may include generating a representation of a supply chain of an organization where the representation is generated responsive to identification of supply chain entities and corresponding flows therebetween. The flows may include transactional layer activities at a stock keeping unit level. The method may further include referencing the representation to determine historical data indicative of supply chain performance, and utilizing processing circuitry to employ the historical data to generate at least one prediction regarding future operating performance of the supply chain.04-04-2013
20130085812Supply Chain Performance Management Tool for Profiling A Supply Chain - A method for providing a supply chain performance management tool may include receiving an identification of supply chain entities and corresponding operational activities therebetween for an organization to generate a functional representation of the supply chain, receiving natively formatted data from the entities of the organization where the natively formatted data is indicative of transactional layer activities, converting, via processing circuitry, the natively formatted data to processed data using a rule set for data conversion developed for the organization, and associating the processed data to the functional representation for generation of one or more reports indicative of supply chain performance.04-04-2013
20130085813Method, Apparatus and Computer Program Product for Providing a Supply Chain Performance Management Tool - A method for providing a supply chain performance management tool may include profiling a supply chain by obtaining data indicative of stock keeping unit level activity associated with flows of items between entities within the supply chain of an organization, cleansing, via processing circuitry, the obtained data based on reconciliation of input from each functional category of entities within the supply chain, and providing performance results based on the cleansed data.04-04-2013

Vinod Boricha, Bhavnagar IN

Patent application numberDescriptionPublished
20140038249Integrated Process For The Production Of Jatropha Methyl Ester And By Products - The present invention provides a simpler and more energy efficient process for the preparation of fatty acid methyl ester (biodiesel) from sun dried whole seed capsules of 02-06-2014

Vinod Bussa US

Patent application numberDescriptionPublished
20090024892System and Method of Testing using Test Pattern Re-Execution in Varying Timing Scenarios for Processor Design Verification and Validation - A system and method processor testing using test pattern re-execution is presented. A processor re-executes test patterns using different timing scenarios in order to reduce test pattern build time and increase system test coverage. The invention described herein varies initial states of a processor's memory (cache, TLB, SLB, etc.) that, in turn, varies the timing scenarios when re-executing test patterns. By re-executing the test patterns instead of rebuilding new test patterns, verification quality is improved since more time is available for execution, verification and validation. In addition, since the test patterns result in the same final state, the invention described herein also simplifies error checking.01-22-2009

Vinod Chakka, Pune IN

Patent application numberDescriptionPublished
20150330192Perforating Gun With Integrated Initiator - A wellbore perforating device includes at least one perforating charge and an initiator. The initiator can include a ballistic train adapted to fire the at least one perforating charge. The ballistic train can include a detonator and a detonator cord. A ballistic interrupt shutter can be disposed between the detonator and the detonator cord. The ballistic interrupt shutter can prevent firing of the detonator cord.11-19-2015

Vinod Chavva, Redmond, WA US

Patent application numberDescriptionPublished
20140129977Notification Hardening - A computing device may include at least one primary notification module and at least one secondary notification module. A notification controller module may trigger a primary notification module and a secondary notification module to generate notification messages or the controller module may trigger the primary notification module to generate a notification message. A graphics device may generate a composite notification message based at least in part on the notification messages from the primary and the secondary notification modules, where representations of the notification messages are stacked one on-top of the other in the composite notification message.05-08-2014

Vinod Dashora, Fremont, CA US

Patent application numberDescriptionPublished
20090119762WLAN Access Integration with Physical Access Control System - A network access system. In particular implementations, a method includes monitoring, responsive to a network access request of a client, an authentication session between an authentication server and the client, and determining user credential information associated with a user of the client based on one or more messages of the authentication session. The method also includes accessing, using the user credential information, physical entry information indicating a physical location of the user relative to a defined perimeter, and conditionally allowing the client access to a network based on the physical entry information and a successful authentication of the client.05-07-2009

Patent applications by Vinod Dashora, Fremont, CA US

Vinod Eligeti, Redwood Shores, CA US

Patent application numberDescriptionPublished
20090063381METHOD AND APPARATUS FOR AUTOMATICALLY EXECUTING RULES IN ENTERPRISE SYSTEMS - One embodiment of the present invention provides an enterprise system that automatically executes a rule associated with an event. During operation, the system receives an event object at the enterprise system. Next, the system creates an intermediate event object based on the event object, wherein the intermediate object is an invocation context for the rule. The system also filters a set of rules with the intermediate event object to obtain a subset of rules. The system then selects a rule that is associated with the event from the subset of rules. Finally, the system executes the rule.03-05-2009

Vinod Gehlot, Bangalore IN

Patent application numberDescriptionPublished
20130223984Multi-Stage Axial Compressor with Counter-Rotation - A multi-stage axial compressor incorporating a counter-rotational movement is provided with a series of rotors mounted along and driven by a driveshaft, and a geared counter-rotating outer casing. A planetary gear system is assembled along a static casing, which can be assembled as a forward or aft casing for the compressor. The bearings of the planetary gear system typically will be aligned concentrically with a center rotor drum assembly mounted along the single driveshaft. The counter-rotating drum assembly will be assembled over the rotor drum assembly and will be engaged by the forward and aft casings so as to provide for counter-rotation of selected ones of the rotors driven by the driveshaft of the compressor.08-29-2013
20140286749MULTI-STAGE AXIAL COMPRESSOR WITH COUNTER-ROTATION USING ACCESSORY DRIVE - A multi-stage axial compressor for counter rotation. A first series of rotor blade assemblies are mounted on and rotate with the driveshaft, each rotor blade assembly of the first series comprising a rotating stage of the multi-stage axial compressor. A second series of rotor blade assemblies provide a counter-rotating stage of the multi-stage axial compressor. An accessory drive links the second series of rotor blade assemblies to the driveshaft and causes counter-rotation of the second series of rotor blade assemblies.09-25-2014

Vinod Govindapillai, Tampere FI

Patent application numberDescriptionPublished
20150268733INTERACTION WITH A COMPUTING DEVICE VIA MOVEMENT OF A PORTION OF A USER INTERFACE - Computing devices, computer-readable storage media, and methods associated with human computer interaction. In embodiments, a computing device may include a display, a processor coupled with the display, a user interface engine and one or more applications to be operated on the processor. In embodiments, the user interface engine or the one or more applications may be configured to detect movement of the portable computing device indicating a direction a user of the portable computing device would like a portion of the user interface to move and cause the portion of the user interface to be moved, from a current location on the display to another location on the display, in accordance with the indicated direction. Such movement may facilitate the user to interact with the portion of the user interface via the interaction zone of the display. Other embodiments may be described and/or claimed.09-24-2015

Vinod Gumudavelli, Mclean, VA US

Patent application numberDescriptionPublished
20150374014AERATED PET TREAT - The present invention provides for an aerated pet treat and a method for weight loss or weight control in pets. The aerated pet treat is preferably low in calories and fat, thus a low calorie pet treat and a low fat treat are also provided. The aerated pet treat is especially attractive to cats.12-31-2015

Vinod Gumudavelli, Antioch, TN US

Patent application numberDescriptionPublished
20090208612Meat Analog Product - A meat analog product is provided prepared starting from a dry component that is a combination of ingredients, including a dry sulfur protein source, a carbohydrate source, a liquid, and a monovalent cationic bicarbonate or carbonate. The meat analog product can be produced and extruded under low shear conditions to provide a product having a plurality of striated and separable aligned fibers and a real meat appearance.08-20-2009

Vinod Gupta, Union City, CA US

Patent application numberDescriptionPublished
20140075010DEVICE DISCOVERY USING BROADCAST TECHNOLOGY - Techniques described herein automatically discover the IP address of a first network device such as but not limited to a multifunction printer. Such techniques use a unique identifier of the first network device, such as for example a multifunction printer serial number. Such unique number is used in the configuration of a second network device, such as for example a Digital Front End/External Print Controller that may need the IP address of the first network device. The unique number may be entered once into the second network device or may be received from the first network device through a data interface by the second network device. Techniques then may use any available broadcast technology such as but not limited to Simple Network Management Protocol (SNMP) to determine from available network devices which network device therefrom has the same unique number, thereby obtaining the IP address of the first network device.03-13-2014

Vinod Jeyachandran, Potomac, MD US

Patent application numberDescriptionPublished
20140133302TUNING ROUTING METRICS TO REDUCE MAXIMUM LINK UTILIZATION AND END-TO-END DELAY VIOLATIONS - A metric tuning technique optimizes the link utilization of a set of links in a network and end-to-end delay or latency constraints. In the embodiments, a delay constraint between node pairs in the network is determined and used in addition to the link utilization to optimize the network. An interactive user interface is provided to allow a user to specify limits and the delay constraints, and to select the sets of links to be addressed. The delay constraints may be specified on an end-to-end or per-link basis. In addition, the latency requirements may be specified for various types of traffic, such as voice, streaming, etc. In one embodiment, the link utilization is minimized within a node pair latency constraint. Link utilization constraints may be preferred before satisfying delay or latency constraints.05-15-2014
20150149828MANAGEMENT OF CLOUD-BASED APPLICATION DELIVERY - The techniques described herein provides troubleshooting, monitoring, reporting and dynamic adjustments and virtualization to management of application delivery. A system can be completely external to an application delivery data path, or can be highly compatible for integration to the application delivery path. Entities can be billed on a per user, per application, per usage, or any combination of consumption-based billing.05-28-2015

Vinod Jeyachandran, Rockville, MD US

Patent application numberDescriptionPublished
20090052333TRAFFIC INDEPENDENT SURVIVABILITY ANALYSIS - First-order effects of hypothesized fault conditions are determined by propagating discrete test packets between select nodes and noting the change of path, if any, taken by the test packet under each condition relative to the fault-free path. Tools are provided to create classes of node pairs of interest, and test packets are created only for select classes. The network is analyzed to identify fault conditions that are likely to impact system performance, and only these fault conditions are simulated. By providing a methodology for selecting classes of node pairs to test, and prioritizing the faults to simulate, a first-order survivability analysis of large networks can be performed efficiently and effectively. The efficiency of this technique is also enhanced by providing test packets that are representative of a wide range of possible source-destination combinations, and by evaluating only the source-destination combinations that may be directly affected by each fault condition.02-26-2009
20100138688MANAGING SERVICE LEVELS ON A SHARED NETWORK - Devices and methods for modeling and analysis of services provided over a common network include a processor configured to track services connected to the common network through nodes and links; run service models associated with the services under selected conditions, the selected conditions including failure and repair of one of the nodes or links; and propose corrective action and/or change of network resources of the common network to minimize impact of the failure. The processor may also run Network models. The models may be executed successively or simultaneously, and outputs of one model may be used as input to other models, including any necessary conversions for compatibility.06-03-2010
20110085449NETWORK PATH DISCOVERY AND ANALYSIS - A network analysis system invokes an application specific, or source-destination specific, path discovery process. The application specific path discovery process determines the path(s) used by the application, collects performance data from the nodes along the path, and communicates this performance data to the network analysis system for subsequent performance analysis. The system may also maintain a database of prior network configurations to facilitate the identification of nodes that are off the path that may affect the current performance of the application. The system may also be specifically controlled so as to identify the path between any pair of specified nodes, and to optionally collect performance data associated with the path.04-14-2011
20110085450NETWORK PATH DISCOVERY AND ANALYSIS - A network analysis system invokes an application specific, or source-destination specific, path discovery process. The application specific path discovery process determines the path(s) used by the application, collects performance data from the nodes along the path, and communicates this performance data to the network analysis system for subsequent performance analysis. The system may also maintain a database of prior network configurations to facilitate the identification of nodes that are off the path that may affect the current performance of the application. The system may also be specifically controlled so as to identify the path between any pair of specified nodes, and to optionally collect performance data associated with the path.04-14-2011
20120163197ROUTING VALIDATION - A simulator simulates routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables can represent steady-state routing tables that should be present in the routers of the actual network at steady state. By querying each router in the actual network for its routing table and comparing each routing table to the corresponding simulator-produced routing table, any differences from the steady state can be identified.06-28-2012
20130007524MULTI-VARIATE NETWORK SURVIVABILITY ANALYSIS - Network survivability is quantified in such a way that failure cases can be compared and ranked against each other in terms of the severity of their impact on the various performance measures associated with the network. The degradation in network performance caused by each failure is quantified based on user-defined sets of thresholds of degradation severity for each performance measure. Each failure is simulated using a model of the network, and a degradation vector is determined for each simulated failure. A comparison function is defined to map the degradation vectors into an ordered set, and this ordered set is used to create an ordered list of network failures, in order of the network degradation caused by each failure.01-03-2013
20140328169NETWORK SIMULATION AND ANALYSIS USING OPERATIONAL FORWARDING DATA - A hybrid approach to populating forwarding tables in a virtual network obtains forwarding data both by simulating routing protocol behavior in the virtual network to build forwarding tables, and by importing operational forwarding data from corresponding physical nodes in a physical network. The use of operational forwarding data improves the fidelity of the simulation by closely conforming forwarding behavior in the simulation to that which occurs in the physical network.11-06-2014

Patent applications by Vinod Jeyachandran, Rockville, MD US

Vinod Kamalaraj, Shirley, MA US

Patent application numberDescriptionPublished
20110096721SYSTEMS AND METHODS FOR SELECTING TRACKING AREAS AND REDUCING PAGING - Some embodiments provide methods for selecting tracking areas in a network, including: generating and storing a plurality of tracking area groups based on which tracking areas of a plurality of tracking areas are served by which base transceiver stations of a plurality of base transceiver stations, each tracking area group including at least one tracking area; receiving a request for a tracking area list from user equipment connected to the network from a first tracking area belonging to a first tracking area group of the stored plurality of tracking area groups; based on the stored plurality of tracking area groups and the first tracking area group, generating a list comprising at least one tracking area; and sending the list comprising at least one tracking area to the user equipment.04-28-2011
20110096731SYSTEMS AND METHODS FOR SELECTING TRACKING AREAS AND REDUCING TRACKING AREA UPDATES - Some embodiments provide methods for selecting tracking areas in a network, comprising: receiving messages from a plurality of base transceiver stations, the messages identifying a previous tracking area identity and a current tracking area identity; storing probabilities based on a count of transitions between the received previous tracking area identities and current tracking area identities; receiving a message from a user equipment device indicating the user equipment device is located in a first tracking area identified by a first tracking area identity; and selecting at least a second tracking area identity based on the stored probabilities and the first tracking area identity; and sending a tracking area identity list to the user equipment device based on the selected second tracking area.04-28-2011
20110098031SYSTEMS AND METHODS FOR REDUCED LATENCY TRACKING AREA SELECTION - Some embodiments provide methods for selecting tracking areas, including: receiving a plurality of messages from a plurality of base transceiver stations, each message including a list of tracking areas handled by the base transceiver station from which the message is received; performing domain name system queries for the tracking areas to retrieve information identifying serving gateways serving the tracking areas; based on the information identifying serving gateways, storing, in a local memory, a list of tracking area identities handled by each identified serving gateway; receiving a message from user equipment indicating a first tracking area; selecting at least one tracking area handled by a serving gateway serving the first tracking area based on the list of tracking areas handled by each identified serving gateway stored in the memory; and sending a tracking area identity list to the user equipment based on the selected at least one tracking area.04-28-2011
20110098050SYSTEMS AND METHODS FOR SELECTING SERVING GATEWAYS TO SERVICE USER EQUIPMENT - Some embodiments provide methods for selecting a serving gateway, including: receiving a message from a base transceiver station including a list of tracking areas handled by the base transceiver station; performing a domain name system query for at least one tracking area to retrieve and store in a local memory information identifying a serving gateway serving the at least one tracking area; receiving an attach request from the base transceiver station identifying the user equipment and a tracking area from which the user equipment is connected to the network; searching the information identifying a serving gateway serving the at least one tracking area stored in the local memory to identify a serving gateway to service the user equipment based on the tracking area from which the user equipment is connected to the network; and sending a message identifying the identified serving gateway to the base transceiver station.04-28-2011
20110098051SYSTEMS AND METHODS FOR CLASSIFYING USER EQUIPMENT AND SELECTING TRACKING AREAS - Some embodiments disclose methods for classifying user equipment in a network, comprising: recording a first number of times a tracking area identity has changed for a user equipment device during a period of time based on messages exchanged between the user equipment device and a mobility management entity; recording a second number of times the user equipment device is paged during a second period of time; classifying the user equipment device into one of at least three categories based on the first and second recorded numbers; generating a tracking area identity list for the user equipment based device on its category; and sending the generated tracking area identity list to the user equipment device.04-28-2011
20130128873METHOD FOR CORRELATING CONNECTION INFORMATION WITH MOBILE DEVICE IDENTITY - A method comprising establishing a first control connection between a home node and a home node gateway having a first control connection identity, establishing a second control connection between the home node gateway and a mobility management device having a second control connection identity, communicating network traffic sent between the home node and the mobility management device on behalf of a mobile device using the first control connection and the second control connection, receiving a mobile device identifier included in a control message sent from the mobility management device using the second control connection in response to an entity type indication sent to the mobility management device from the home node gateway, the mobile device identifier uniquely identifying the mobile device, and correlating the mobile device identifier with a context including the first control connection identity and the second control connection identity.05-23-2013
20130142122SYSTEMS AND METHODS FOR SELECTING SERVING GATEWAYS TO SERVICE USER EQUIPMENT - Some embodiments provide methods for selecting a serving gateway to service user equipment in communication with a network, including: receiving a message from a base transceiver station including a list of tracking areas handled by the base transceiver station, initiating a domain name system query for at least one tracking area in the list of tracking areas to identify information indicating a serving gateway serving the at least one tracking area, storing, in local memory, the information indicating the serving gateway serving the at least one tracking area, and upon an occurrence of a triggering event, retrieving, from the local memory, the stored information indicating the serving gateway serving the at least one tracking area.06-06-2013
20130157658SYSTEMS AND METHODS FOR CLASSIFYING USER EQUIPMENT AND SELECTING TRACKING AREAS - Some embodiments disclose a method for providing a tracking area identity list in a communications network. The method includes maintaining a tracking area transition likelihood and a tracking area group transition likelihood, and recording a mobility number and a paging number. The method further includes determining a category associated with the user equipment device based on the recorded mobility number and the recorded paging number, and generating the tracking area identity list for the user equipment device based on the category associated with the user equipment device and one or both of the tracking area transition likelihood and the tracking area group transition likelihood.06-20-2013

Vinod Kanniah, Lexington, KY US

Patent application numberDescriptionPublished
20110177252COATING COMPOSITIONS FOR PRODUCING TRANSPARENT SUPER-HYDROPHOBIC SURFACES - A coating composition and process for generating transparent, near-transparent, and semi-transparent super-hydrophobic coatings on surfaces having a contact angle of greater than 165 degrees. The composition comprises hydrophobic nanoparticles of silsesquioxanes containing adhesion promoter groups and low surface energy groups.07-21-2011

Vinod Kannoth, Glen Allen, VA US

Patent application numberDescriptionPublished
20090070403DISTRIBUTED ENVIRONMENT CONTROLLED ACCESS FACILITY - A computer implemented web based access control facility for a distributed environment, which allows users to request for access, take the request through appropriate approval work flow and finally make it available to the users and applications. This program also performs an automatic task of verifying the health of data, access control data as well as the entitlements, to avoid malicious user access. The system also provides an active interface to setup a backup, to delegate the duty in absence. Thus this system provides a comprehensive facility to grant, re-certify and control the entitlements and users in a distributed environment.03-12-2009

Vinod Kariat, Sunnyvale, CA US

Patent application numberDescriptionPublished
20090006065METHOD TO PRODUCE SUBSTRATE NOISE MODEL AND RELATED SYSTEM AND ARTICLE OF MANUFACTURE - A method is provided to produce a model of an integrated circuit substrate, the method comprising: providing a tile definition that specifies an electrical model associated with instances of the tile; mapping a plurality of respective tile instances to respective locations of the substrate; and connecting the mapped tile instances to each other to produce a tile grid that models overall electrical behavior of the substrate.01-01-2009
20090007032METHOD AND APPARATUS FOR SUBSTRATE NOISE ANALYSIS USING SUBSTRATE TILE MODEL AND TILE GRID - A method is provided to evaluate substrate noise propagation in an integrated circuit design, the method comprising: providing a tile definition that specifies an electrical model associated with instances of the tile; mapping a plurality of respective tile instances to respective locations of the substrate; obtaining respective waveforms indicative of digital switching induced power grid fluctuations associated with the respective identified contacts; and associating a voltage with a selected tile instance of the tile grid that is indicative of substrate noise injection due to waveforms associated with contacts encompassed by the selected tile instance.01-01-2009
20090199140METHOD AND APPARATUS FOR THERMAL ANALYSIS - Some embodiments of the invention provide a method for performing thermal analysis of an integrated circuit (“IC”) layout that includes numerous circuit modules. In some embodiments, the method initially defines several power dissipation equations that express the temperature dependence of the power dissipation for several circuit modules. In some embodiments, the power dissipation equations express a non-linear relationship between power dissipation and temperature. The method defines a heat flow equation based on the specified power dissipation equations. The method then solves the heat flow equation to identify a temperature distribution for the design layout.08-06-2009
20090319964METHOD AND APPARATUS FOR THERMAL ANALYSIS - Some embodiments of the invention provide a method for performing thermal analysis of an integrated circuit (“IC”) design layout that includes numerous circuit modules. The method divides the IC design layout into a set of elements, where at least one element includes several wires. The method computes a set of conductivity groups of values for the set of elements. The method identifies a temperature distribution for the IC design layout based on the set of conductivity groups of values. In some embodiments, each of these elements corresponds to a particular portion of a particular layer of the IC design layout. Each element includes several nodes. Each conductivity group of values is defined by entry values. Each entry value describes how heat flow at a particular node of the element is affected by a temperature change at another particular node of the element.12-24-2009
20090319965METHOD AND APPARATUS FOR THERMAL ANALYSIS OF THROUGH-SILICON VIA (TSV) - Some embodiments of the invention provide a method for performing thermal analysis of an integrated circuit (“IC”) design layout. The IC design layout includes several wiring layers in some embodiments. The IC design layout includes a substrate that has at least one through-silicon via (“TSV”). The method divides the IC design layout into a set of elements. The method identifies a temperature distribution for the IC design layout by using the set of elements. In some embodiments, at least one element includes a metal component and a non-metal component. The non-metal component is silicon in some embodiments, and a dielectric in other embodiments.12-24-2009
20100023903METHOD AND APPARATUS FOR MULTI-DIE THERMAL ANALYSIS - Some embodiments of the invention provide a method for performing thermal analysis of a multi-die integrated circuit (IC) design layout. The thermal analysis produces a temperature distribution for analyzing internal properties of each die within the multi-die design and for analyzing thermal interactions between two or more dies of the design based on an internal configuration of the two or more dies. Therefore, in some embodiments, the temperature distribution shows a temperature distribution for each die and the individual temperature distribution show varying temperature across each of the dies. Some embodiments reduce the number of iteration required to perform the thermal analysis by constructing a high quality preconditioner based on thermal conducting segments introduced to model thermal effects at the boundaries between two dies.01-28-2010
20120102449METHOD AND APPARATUS FOR THERMAL ANALYSIS - Some embodiments of the invention provide a method for performing thermal analysis of an integrated circuit (“IC”) design layout that includes numerous circuit modules. The method divides the IC design layout into a set of elements, where at least one element includes several wires. The method computes a set of conductivity groups of values for the set of elements. The method identifies a temperature distribution for the IC design layout based on the set of conductivity groups of values. In some embodiments, each of these elements corresponds to a particular portion of a particular layer of the IC design layout. Each element includes several nodes. Each conductivity group of values is defined by entry values. Each entry value describes how heat flow at a particular node of the element is affected by a temperature change at another particular node of the element.04-26-2012
20120210285METHOD AND APPARATUS FOR THERMAL ANALYSIS OF THROUGH-SILICON VIA (TSV) - Some embodiments of the invention provide a method for performing thermal analysis of an integrated circuit (“IC”) design layout. The IC design layout includes several wiring layers in some embodiments. The IC design layout includes a substrate that has at least one through-silicon via (“TSV”). The method divides the IC design layout into a set of elements. The method identifies a temperature distribution for the IC design layout by using the set of elements. In some embodiments, at least one element includes a metal component and a non-metal component. The non-metal component is silicon in some embodiments, and a dielectric in other embodiments.08-16-2012
20120297357METHOD AND APPARATUS FOR MULTI-DIE THERMAL ANALYSIS - Some embodiments of the invention provide a method for performing thermal analysis of a multi-die integrated circuit (IC) design layout. The thermal analysis produces a temperature distribution for analyzing internal properties of each die within the multi-die design and for analyzing thermal interactions between two or more dies of the design based on an internal configuration of the two or more dies. Therefore, in some embodiments, the temperature distribution shows a temperature distribution for each die and the individual temperature distributions show varying temperature across each of the dies. Some embodiments reduce the number of iteration required to perform the thermal analysis by constructing a high quality preconditioner based on thermal conducting segments introduced to model thermal effects at the boundaries between two dies.11-22-2012
20120304137METHOD AND APPARATUS FOR MULTI-DIE THERMAL ANALYSIS - Some embodiments of the invention provide a method for performing thermal analysis of a multi-die integrated circuit (IC) design layout. The thermal analysis produces a temperature distribution for analyzing internal properties of each die within the multi-die design and for analyzing thermal interactions between two or more dies of the design based on an internal configuration of the two or more dies. Therefore, in some embodiments, the temperature distribution shows a temperature distribution for each die and the individual temperature distributions show varying temperature across each of the dies. Some embodiments reduce the number of iteration required to perform the thermal analysis by constructing a high quality preconditioner based on thermal conducting segments introduced to model thermal effects at the boundaries between two dies.11-29-2012

Patent applications by Vinod Kariat, Sunnyvale, CA US

Vinod Khadkikar, London CA

Patent application numberDescriptionPublished
20120205981UTILIZATION OF DISTRIBUTED GENERATOR INVERTERS AS STATCOM - The invention provides a method and system for operating a solar farm inverter as a Flexible AC Transmission System (FACTS) device—a STATCOM—for voltage control. The solar farm inverter can provide voltage regulation, damping enhancement, stability improvement and other benefits provided by FACTS devices. In one embodiment, the solar farm operating as a STATCOM at night is employed to increase the connectivity of neighbouring wind farms that produce peak power at night due to high winds, but are unable to connect due to voltage regulation issues. The present invention can also operate during the day because there remains inverter capacity after real power export by the solar farm. Additional auxiliary controllers are incorporated in the solar farm inverter to enhance damping and stability, and provide other benefits provided by FACTS devices.08-16-2012

Vinod Khadkikar, Abu Dhabi AE

Patent application numberDescriptionPublished
20150077067FAULT-TOLERANT WIND ENERGY CONVERSION SYSTEM - This disclosure is directed to a fault-tolerant energy conversion system. A fault-tolerant doubly-fed induction generator (DFIG) for use with a wind energy conversion system (WECS) consistent with the present disclosure may allow for seamless operation during all kinds of grid faults. In one embodiment, a six-switch grid side converter (GSC) commonly used with such systems may be replaced with nine-switch converter circuitry. With three additional switches, the nine-switch converter can provide two independent three phase outputs. For example, one three-phase output may be coupled to the grid through interfacing inductors to realize normal GSC operation, while the other three-phase output may be coupled to neutral side of the stator windings to provide fault ride-through (FRT) capability to the DFIG. A control algorithm may be employed that both achieves seamless fault ride-through during any kind of grid faults and strictly satisfies grid codes requirements.03-19-2015

Vinod Kulathumani, Morgantown, WV US

Patent application numberDescriptionPublished
20150234443SELECTIVE WAKEUP OF DIGITAL SENSING AND PROCESSING SYSTEMS USING RECONFIGURABLE ANALOG CIRCUITS - According to some embodiments, a sensor network may be provided with re-programmable and/or reconfigurable analog circuitry configured to monitor data collected by the sensor network. The re-programmable and/or reconfigurable analog circuitry may also generate a wakeup signal in response to a defined wakeup event detected by the sensor network.08-20-2015

Vinod Kunnambath, Bangalore IN

Patent application numberDescriptionPublished
20110309809HIGH POWER DC SSPC WITH CAPABILITY OF SOFT TURN-ON TO LARGE CAPACITIVE LOADS - Pre-charge circuitry allows capacitive loads connected to a solid state power controller to be gradually charged up by a PWM, generated with a cycle by cycle current limit, switching a single MOSFET in series with an inductor, before the SSPC is turned on. The pre-charge circuitry may require only three additional components, e.g., a MOSFET, an inductor and a diode, along with a designated MOSFET gate driver.12-22-2011

Vinod Kunnambath, Thrissur IN

Patent application numberDescriptionPublished
20130207705SSPC DISTRIBUTION SYSTEM AND CONTROL STRATEGY - A power distribution system includes the use of a master digital signal processor (DSP) and two slave DSPs connected to the master DSP. The slaves DSPs may be connected to each of a plurality of solid state power channels (SSPC) controlling power distribution functions to each of the channels. A power control strategy may use one power supply for the master DSP, a second power supply shared between the slave DSPs, and a third power supply shared between each of the SSPC channels.08-15-2013

Vinod Labhasetwar, Solon, OH US

Patent application numberDescriptionPublished
20090018078Apoptosis-Modulating Protein Therapy for Proliferative Disorders and Nanoparticles Containing the Same - Protein containing nanoparticles and methods of use thereof for the treatment of proliferative disorders are disclosed.01-15-2009
20090136585SURFACE-MODIFIED NANOPARTICLES FOR INTRACELLULAR DELIVERY OF THERAPEUTIC AGENTS AND COMPOSITION FOR MAKING SAME - Surface-modified polymeric nanoparticles (NPs), compositions for making them, and their use in drug delivery are disclosed.05-28-2009
20110130325Apoptosis-Modulating Protein Therapy for Proliferative Disorders and Nanoparticles Containing the Same - Protein containing nanoparticles and methods of use thereof for the treatment of proliferative disorders are disclosed.06-02-2011
20140100182Nanogel-Mediated Drug Delivery - Provided herein are methods of inhibiting proliferation of one or more tumor cells comprising contacting the one or more tumor cells with a composition comprising one or more epigenetic drugs that inhibit one or more epigenetic mechanisms of the tumor cells, wherein the one or more epigenetic drugs are encapsulated in a nanogel. The invention is also directed to methods of treating a tumor, metastasis of a tumor or a combination thereof in an individual in need thereof. The invention is also directed to a method of sequentially delivering one or more epigenetic drugs that alter one or more epigenetic mechanisms of a tumor cell and one or more chemotherapeutic drugs to an individual that has a tumor. Compositions which comprise one or more epigenetic drugs that alter one or more epigenetic mechanisms of a tumor cell, wherein the one or more epigenetic drugs are encapsulated in a nanogel.04-10-2014
20150374798Methods of Treating Spinal Cord Injury - The invention is directed to a method of treating a spinal cord injury, a neurodegenerative disease or a neuronal injury in an individual in need thereof comprising administering an effective amount of superoxide dismutase (SOD) and catalase to the individual, wherein the superoxide dismutase and the catalase are encapsulated in one or more nanoparticles that release the SOD and catalase upon administration. Another aspect of the invention is directed to compositions comprising superoxide dismutase (SOD) and catalase encapsulated in one or more nanoparticles.12-31-2015

Patent applications by Vinod Labhasetwar, Solon, OH US

Vinod Malamal-Vadakital, Tampere FI

Patent application numberDescriptionPublished
20100121977Predictive Bit-Rate Modification of Content Delivery in a Wireless Network - A sender in a wireless network may adjust the encoding bit rate of the transmitted content and/or the transmission bit rate of the content based on the predicted future channel throughput at a predicted future geographical position of a client mobile device, such as a cellular telephone. By appropriately adjusting the bit rate prior to the client mobile device experiencing the predicted low throughput, the likelihood of continuous content consumption by the client mobile device, even while experiencing the predicted low throughput conditions, may be increased. The prediction may be performed at the network side and/or at the client mobile device side.05-13-2010
20120011265METHOD AND APPARATUS FOR CALCULATING A PROBABLE THROUGHPUT FOR A LOCATION BASED AT LEAST IN PART ON A RECEIVED THROUGHPUT - An apparatus for calculating a probable throughput for a location may include a compiler for organizing a received throughput corresponding to a recorded throughput and a location indicator stored in a memory device. The calculation of the probable throughput may be conducted by a probable throughput calculator. The stream rate may thus be adapted by a stream rate adaptor in response to the probable throughput at the location to thereby create a buffer of sufficient size to continue rendering the content at the location. For example, the stream rate may be adapted to a maximum throughput value which is determined by a maximum throughput determiner.01-12-2012

Vinod Mamtani, Bellevue, WA US

Patent application numberDescriptionPublished
20090157935Efficient interrupt message definition - An efficient interrupt system for a multi-processor computer. Devices interrupt a processor or group of processors using pre-defined message address and data payload communicated with a memory write transaction over a PCI, PCI-X, or PCI Express bus. The devices are configured with messages that each targets a processor. Upon receiving a command to perform an operation, the device may receive an indication of a preferred message to use to interrupt a processor upon completion of that operation. The efficiency with which each interrupt is handled and the overall efficiency of operation of the computer is increased by defining messages for the devices within the computer so that each device contains messages targeting processors distributed across groups of processors, with each group representing processors in close proximity. In selecting target processors for messages, processors are selected to spread processing across the processor groups and across processors within each group.06-18-2009

Vinod Mukundagiri, Dallas, TX US

Patent application numberDescriptionPublished
20140160600REVERSE VOLTAGE CONDITION PROTECTION IN A POWER SUPPLY SYSTEM - One embodiment includes a power system. The system includes a power switch device that is activated to provide an output voltage to a load in response to an input voltage. The power switch device includes a control terminal and a bulk connection. The system also includes a reverse voltage control circuit configured to passively couple the input voltage to one of the control terminal and the bulk connection in response to a reverse voltage condition in which an amplitude of the input voltage becomes negative. The system further includes an output shutoff circuit configured to passively couple the output voltage to a neutral-voltage rail during the reverse voltage condition.06-12-2014

Vinod Nalla, Bangalore IN

Patent application numberDescriptionPublished
20120102289ORGANIZATION OF A SMALL OBJECT AREA AND A LARGE OBJECT AREA IN A JAVA HEAP - Managing multiple object areas in a memory heap, comprises allocating a memory heap as a contiguous range of memory, allocating a small object area within the memory heap having an initial start at a first end of the memory heap and allocating a large object area within the memory heap having an initial start at a second end of the memory heap opposite the first end such that the small object area and the large object area grow in opposite directions inward within the memory heap. Further, allocations are performed into the memory heap based upon a predetermined allocation policy such that the large object area is reserved for the allocation of large objects.04-26-2012
20120246204Handling Persistent/Long-Lived Objects To Reduce Garbage Collection Pause Times - A method, system and computer program product for reducing garbage collection pause time. According to example embodiments, a garbage collection cycle is initiated on a set of objects that have been dynamically allocated in a memory. An identification is made of new persistent objects and reachable non-persistent objects while ignoring old persistent objects that have been identified as persistent in previous garbage collection cycles. The new persistent objects are associated as members of a set of persistent objects that includes the old persistent objects. The persistence information for the set of persistent objects is preserved for use during subsequent garbage collection cycles. All reachable non-persistent objects and all persistent objects in the set of persistent objects are marked for memory reclamation phase processing. The persistent objects are so marked using the preserved persistence information such that repeated scanning of persistent objects during multiple garbage collection cycles is avoided.09-27-2012
20140310498ORGANIZATION OF A SMALL OBJECT AREA AND A LARGE OBJECT AREA IN A JAVA HEAP - A memory heap is allocated to a contiguous range of memory. One end of the heap is designated as a small object area. The other end of the heap is designated as a large object area. When the two object areas grow, the small object area grows inward within the heap toward the large object area, and the large object area grows inward within the heap toward the small object area.10-16-2014

Vinod Narapareddy, Bangalore IN

Patent application numberDescriptionPublished
20150310337METHOD FOR PROVIDING A PLATFORM FOR BUILDING A DYNAMIC SOCIAL KNOWLEDGEBASE - The present invention provides a method and system for providing a platform for building a dynamic social knowledgebase. The method includes importing a traditional knowledgebase from an entity at regular intervals, receiving login credentials from a user via a web portal or mobile application. Retrieving social knowledgebase from a social network associated with the user, providing recommendations to the user based on articles that are more clickable in the traditional knowledgebase and the social knowledgebase, sending a notification to the user based on the latest happenings in the web portal or mobile application, monitoring a list of top contributors and influencers of the social knowledgebase in the social network associated with the user, and sending the list of top contributors and influencers to a backend system for analysis & use.10-29-2015

Vinod Narippatta, Kothanur IN

Patent application numberDescriptionPublished
20110235646METHOD AND APPARATUS FOR DETERMINING PROPAGATION DELAY IN A NETWORK - A propagation delay in the transmission of a frame from an initiator node to a peer node is determined by initially identifying a frame number and byte offset of a first incoming frame from the peer node at a time when the initiator node outputs a portion of a transmitted frame. The portion of the transmitted frame may be the first byte of a sub-frame within the transmitted frame. At the peer node, the frame number and byte offset of a second frame to be supplied to the initiator node is identified at a later time when the frame portion transmitted by the initiator node is received by the peer node, and such information is transmitted to the initiator node. Thus, since the frames output and received by the initiator node are typically of fixed duration, the frame number and byte offset of the incoming frame represent the time when the initiator node outputs the frame portion (a transmit time). In addition, the frame number and byte offset of the second frame represents the time at which the frame portion is received by the peer node (a receive time). Accordingly, by comparing the frame numbers and byte offsets of the first and second frames received from the peer node, a difference between transmit and receive times or propagation delay can be obtained.09-29-2011

Vinod Palathinkara, Brookfield, WI US

Patent application numberDescriptionPublished
20140029818SYSTEMS AND METHODS FOR REMOTE IMAGE RECONSTRUCTION - A system is provided including a processing unit including an input module, a processing module, and an output module. The processing unit is located at a first location that is remotely located from a scanning location at which a remote medical scanning system is located. The input module is configured to communicate with the remote medical scanning system to receive scanning data obtained during a scan performed by the remote medical scanning system, the scanning data corresponding to an object scanned by the remote medical scanning system. The processing module is configured to use the scanning data to reconstruct an image representing the object. The output module is configured to provide access to the image reconstructed by the processing module to at least one of the remote medical scanning system or a requester located remotely from the first location.01-30-2014

Vinod Pandiripally, Overland Park, KS US

Patent application numberDescriptionPublished
20120258502Method of producing recombinant plasmid dna using substantially solid growth medium - A method of producing recombinant plasmid DNA using substantially solid growth medium and disposable vessels in place of conventional liquid fermentation processes. The method includes inoculating a host organism containing the recombinant plasmid DNA onto the substantially solid growth medium in a disposable vessel; allowing the host organism to grow on the growth medium under conditions conducive to such growth; removing the host organism from the growth medium and lysing the host organism to access the recombinant plasmid DNA; and purifying the recombinant plasmid DNA.10-11-2012

Vinod Pathangay, Bangalore IN

Patent application numberDescriptionPublished
20110102318USER INPUT BY POINTING - Presented is apparatus for capturing user input by pointing at a surface using pointing means. The apparatus comprises: a range camera for producing a depth-image of the pointing means; and a processor. The processor is adapted to determine from the depth-image the position and orientation of a pointing axis of the pointing means; extrapolate from the position and orientation the point of intersection of the axis with the surface; and control an operation based on the location of the point of intersection.05-05-2011
20110219340SYSTEM AND METHOD FOR POINT, SELECT AND TRANSFER HAND GESTURE BASED USER INTERFACE - A system and method for a point, select and transfer hand gesture based user interface is disclosed. In one embodiment, a depth image of a hand gesture is captured using an in-front camera substantially on a frame by frame basis within a predefined interaction volume. Also, a nearest point of the hand gesture to a display screen of a display device is found using a substantially nearest depth value in the captured depth image for each frame. Further, an image-to-screen mapping of the captured depth image and the found nearest point to the display screen is performed upon validating the found nearest point as associated with the hand for each frame. Moreover, one of select options displayed on the display screen is pointed and selected when the substantially nearest depth value is within one or more predetermined threshold ranges, and based on the outcome of the image-to-screen mapping.09-08-2011
20120093360HAND GESTURE RECOGNITION - Systems, methods, and machine readable and executable instructions are provided for hand gesture recognition. A method for hand gesture recognition can include detecting, with an image input device in communication with a computing device, movement of an object. A hand pose associated with the moving object is recognized and a response corresponding to the hand pose is initiated.04-19-2012
20140219517METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR EFFICIENTLY RECOGNIZING FACES OF IMAGES ASSOCIATED WITH VARIOUS ILLUMINATION CONDITIONS - An apparatus for recognizing faces with different illuminations may include a processor and memory storing executable computer program code causing the apparatus to at least perform operations including detecting and extracting face data of a first candidate face of a first image and a second candidate face of a second image. The first image is associated with a first light intensity and the second image associated with a second light intensity different from the first light intensity. The computer program code may further cause the apparatus to analyze face data to determine whether the first candidate face corresponds to an area in the first image that is substantially the same as an area of the second candidate face and evaluate data of the first and second areas to determine whether the first and second candidate faces are valid or invalid faces. Corresponding methods and computer program products are also provided.08-07-2014
20140294300FACE MATCHING FOR MOBILE DEVICES - A method includes receiving an image of a face to match with images of known faces, extracting blocks multiple blocks from the received image, calculating local binary pattern histograms for each block, generating matching scores for each block against block of the images of known faces, determining a top number, N, of matching scores less than the number of blocks, and matching the received image to an image of a known face as a function of the top number of matching scores.10-02-2014
20150030987FLARE STACK MONITORING - Methods, systems, and computer-readable and executable instructions are described herein. One method includes receiving a sequence of images of a flare stack area from a thermal imaging component, identifying a first portion of the flare stack area moving at a first threshold optical flow using the sequence of images of the flare stack area, and identifying a second portion of the flare stack area moving at a second threshold optical flow using the sequence of images of the flare stack area.01-29-2015
20150223743METHOD FOR MONITORING A HEALTH CONDITION OF A SUBJECT - Embodiments of the present disclosure provide a method and a computing unit to monitor health condition of a subject. The computing unit receives physiological signals from a plurality of sensors placed on the subject. The computing unit detects a work-type based on the physiological signals received from the plurality of sensors and assigns a weight to each of the plurality of sensors based on the work-type. Thereafter, the computing unit generates a fatigue score using the physiological signals and the weight of the plurality of sensors. The fatigue score indicates the health condition of the subject.08-13-2015
20150305688METHOD OF DETERMINING DISCHARGE READINESS CONDITION FOR A PATIENT AND SYSTEM THEREOF - Embodiments of the present disclosure provide a method of determining discharge readiness condition for a patient. The sensors are placed on patient to monitor the physiological condition of the patient and to transmit physiological data to computing device. The patient also provides non-physiological data using mobile device to computing device. The processor configured in computing unit assigns predefined weighted ratio to each of the physiological data and non-physiological data to generate weighted physiological and non-physiological data. The processor generates recovery score using the weighted physiological data and the non-physiological data and compares the recovery score with reference recovery score. The reference recovery score is personalized for each patient using weighted personal reference score and weighted EMR reference score. If recovery score exceeds reference recovery score then patient is ready for discharge else the patient is not ready to be discharged and hence appropriate suggestions are provided to improve recovery score.10-29-2015

Patent applications by Vinod Pathangay, Bangalore IN

Vinod Pisharody, San Jose, CA US

Patent application numberDescriptionPublished
20080263209Active-active operation for a cluster of SSL virtual private network (VPN) devices with load distribution - A method of load distribution for a cluster of two or more nodes. The method comprises receiving an initial request packet on a network device having a virtual IP address; forwarding the request packet from the network device to a cluster of at least two nodes, wherein each of the at least two nodes has an internal dispatcher module and an unique and non-conflicting virtual IP address; establishing one of the at least two nodes as a priority dispatcher or dispatcher endpoint, wherein if any one node fails, the virtual IP address of the one node which is no longer active falls back to another node within the cluster based on cluster priorities; dispatching the request packet to one of the nodes associated with the cluster; and forwarding the request from one of the nodes to a switching device.10-23-2008
20150215314METHODS FOR FACILITATING IMPROVED USER AUTHENTICATION USING PERSISTENT DATA AND DEVICES THEREOF - A method, non-transitory computer readable medium, and access policy management computing device that obtains a first set of attributes based on a login request received from a client device. The first set of attributes includes at least credentials for a user of the client device. A persistent data store record for the user is identified and a second set of attributes associated with the user, and included in the persistent data store record, is imported into a session cache record for the user. A fingerprint including the second set of attributes is compared to the first set of attributes. A multifactor or single factor authentication is initiated based on a result of the comparison to determine when the credentials for the user are valid. A session for the user is established and access by the user to network resource(s) is allowed, when the credentials for the user are valid.07-30-2015

Vinod Ramachandra Panicker, Kochi IN

Patent application numberDescriptionPublished
20150365477SYSTEM AND METHOD FOR AUTOMATING IDENTIFICATION AND DOWNLOAD OF WEB ASSETS OR WEB ARTIFACTS - Methods, non-transitory computer-readable media, and apparatuses that automate identification and download of one or more web assets residing in a cloud based infrastructure include a training phase and an actual run time phase. In the training phase, the system is trained to identify and download the one or more web assets by generating URLs on its own. The one or more web assets may be an image, document, file containing source code. In the actual run time phase, when the one or more web assets has migrated from one machine to another machine in the cloud, the one or more web assets are again referenced. The system is intelligent enough to detect this re referencing and retrieving the one or web assets.12-17-2015

Vinod Ramaseshan, Ras Tanura SA

Patent application numberDescriptionPublished
20130112595HYDROCRACKING PROCESS WITH INTEGRAL INTERMEDIATE HYDROGEN SEPARATION AND PURIFICATION - An intermediate hydrogen separation and absorption-based purification system is integrated with a hydrocracking process for the production of relatively lower molecular weight products from a relatively heavy feedstock including sulfur-containing and nitrogen-containing hydrocarbon compounds. The integrated process allows the processing of heavy hydrocarbon feedstock having high nitrogen and high sulfur contents in a single-stage configuration and the using of noble metal catalyst in the hydrocracking reaction zone. The integrated process increases the overall catalytic activity and hydrogenation capability to produce superior distillate products.05-09-2013
20130112596HYDROTREATING AND AROMATIC SATURATION PROCESS WITH INTEGRAL INTERMEDIATE HYDROGEN SEPARATION AND PURIFICATION - An intermediate hydrogen separation and purification system is integrated with a hydrotreating and an aromatic saturation process for the production of relatively lower molecular weight products from a relatively heavy feedstock including sulfur-containing and aromatic-containing hydrocarbon compounds. The integrated process allows the processing of heavy hydrocarbon feedstock having high aromatic and high sulfur contents in a single-stage configuration and the using of noble metal catalyst in the aromatic saturation zone. The integrated process increases the overall catalytic activity and hydrogenation capability to produce superior distillate products.05-09-2013
20150136649HYDROTREATING AND AROMATIC SATURATION PROCESS WITH INTEGRAL INTERMEDIATE HYDROGEN SEPARATION AND PURIFICATION - An intermediate hydrogen separation and purification system is integrated with a hydrotreating and an aromatic saturation process for the production of relatively lower molecular weight products from a relatively heavy feedstock including sulfur-containing and aromatic-containing hydrocarbon compounds. The integrated process allows the processing of heavy hydrocarbon feedstock having high aromatic and high sulfur contents in a single-stage configuration and the using of noble metal catalyst in the aromatic saturation zone. The integrated process increases the overall catalytic activity and hydrogenation capability to produce superior distillate products.05-21-2015

Vinod Ramaseshan, Woking GB

Patent application numberDescriptionPublished
20110203969PROCESS, SYSTEM, AND APPARATUS FOR A HYDROCRACKING ZONE - One exemplary embodiment can be a process for a hydrocarbon feed. The process can include passing a stream through a separation zone forming a void for separating one or more gases from one or more liquids and at least partially containing a catalyst. The catalyst may include at least one group VIII noble metal. Typically, the separation zone is downstream of a hydrocracking zone for reducing the operating pressure in the hydrocracking zone.08-25-2011

Vinod Ramaseshan, Ras Tanua SA

Patent application numberDescriptionPublished
20140262941Two Stage Hydrocracking Process and Apparatus for Multiple Grade Lube Oil Base Feedstock Production - Multiple grades of lube oil base feedstock are produced within a two-stage hydrocracking unit. Effluent from a first hydrocracking zone is sent to a separation zone, which includes multiple separation vessels, and a heavy liquid stream enters one cell of a dual cell fractionator charge heater and is flashed in the distillation zone of a divided wall fractionation column. A portion of the bottom stream from one side of the divided wall column is sent to the second hydrocracking zone. Feed to a second cell of the dual cell fractionation column is derived from the effluent of this second hydrocracking zone. A different lube oil base feedstocks is derived from each of the cells of the dual cell fractionation column.09-18-2014

Vinod Sachanandani, Mumbai IN

Patent application numberDescriptionPublished
20130102306AUTO IMSI SWITCH FOR INTERNATIONAL ROAMING - The invention concerns a method for automatically switching from a Home IMSI to a Roaming IMSI and vice versa, said Home IMSI and Roaming IMSI being contained in a SIM card adapted to be used in a mobile station and adapted to comprise elementary files, wherein it comprises the step of triggering the switch from one IMSI to another when detecting an update of the elementary file comprising forbidden public land mobile networks (EF04-25-2013

Vinod Sannareddy, Austin, TX US

Patent application numberDescriptionPublished
20100165756METHODS AND SYSTEMS TO IMPROVE WRITE RESPONSE TIMES OF MEMORY CELLS - Methods and systems to dynamically control state-retention strengths of a plurality of memory cells during a write operation to a subset of the memory cells. Dynamic control may include weakening state-retention strengths of the plurality of memory cells during a write operation to a subset of the memory cells, while preserving state-retention abilities of remaining ones of the plurality of memory cells. Weakening may include adjusting one or more resistances between one or more power supplies and the plurality of memory cells. Dynamic control may be selectively performed on portions of each of the memory cells in response to an input data logic state. Dynamic control may reduce a write contention within the subset of memory cells without disabling state-retention abilities of remaining ones of the plurality of memory cells, and may improve write response times of the memory cells.07-01-2010
20130271199VOLTAGE LEVEL SHIFT WITH INTERIM-VOLTAGE-CONTROLLED CONTENTION INTERRUPT - Methods and systems to implement voltage level shifting with interim-voltage-controlled contention-interruption. A voltage level shifter (VLS) may include voltage level shift circuitry to level shift an input logical state from an input voltage swing to an output voltage swing. The VLS may include contention circuitry, a contention interrupter, and an interrupt controller to generate a contention-interrupt control having an interim voltage swing. A lower limit of the interim voltage swing may correspond to a lower limit of the output voltage swing. An upper limit of the interim voltage swing may correspond to an upper limit of the input voltage swing. The VLS may be implemented to level shift true and complimentary logical states, such as with cascode voltage switch logic (CVSL). The interim-voltage-controlled contention interrupter may help to maintain voltages within process-based voltage reliability limits of the contention interrupter, with relatively little delay, and relatively little power and area consumption.10-17-2013

Vinod Singh, Bangalore IN

Patent application numberDescriptionPublished
20140104080SYSTEM AND METHOD FOR INCREASING SITUATIONAL AWARENESS BY CORRELATING INTRUDER AIRCRAFT ON A LATERAL MAP DISPLAY AND A VERTICAL SITUATION DISPLAY - A system and method for displaying a first intruder aircraft symbology on a lateral map display and on a vertical situation display is provided. Symbology is generated that is graphically representative of the first intruder aircraft on the lateral map display and the VSD. Additional symbology is generated to correlate the first intruder aircraft on the lateral map display to that on the vertical situation display.04-17-2014

Vinod Singh, Raichur IN

Patent application numberDescriptionPublished
20150259364CRYSTALLINE BORTEZOMIB PROCESS - The present invention provides process for preparation of crystalline Bortezomib (Ia) as its monohydrate which is designated as crystalline Form-SB09-17-2015

Vinod Srinivasan, San Diego, CA US

Patent application numberDescriptionPublished
20100159008HYDROGELS, METHODS OF MAKING HYDROGELS, METHODS OF USING HYDROGELS, AND METHODS OF ISOLATING, TRAPPING, ATTRACTING, AND/OR KILLING CANCER CELLS - Embodiments of the present disclosure provide for hydrogels, methods of making hydrogels, methods of using hydrogels, methods of isolating, trapping, attracting, and/or killing cancer cells, and the like.06-24-2010

Vinod Tarwade, Rockville, MD US

Patent application numberDescriptionPublished
20130190399Synthesis and use of omega-3 and omega 6 very long chain polyunsaturated fatty acids (VLC-PUFA) - The invention provides methods of synthesizing omega-3 and omega-6 very long chain polyunsaturated fatty acids (VLC-PUFAs, C28-C42:4, 5 and 6), analogs and derivatives thereof, pharmaceutical compositions containing these isolated VLC-PUFA compounds and therapeutic uses therefor.07-25-2013

Vinod Thourani, Atlanta, GA US

Patent application numberDescriptionPublished
20140039375SYSTEMS FOR IMPLANTING AND USING A CONDUIT WITHIN A TISSUE WALL - Various embodiments of the present invention provide a conduit system including an outer lumen (02-06-2014

Vinod Tipparaju, Austin, TX US

Patent application numberDescriptionPublished
20140331230Remote Task Queuing by Networked Computing Devices - The described embodiments include a networking subsystem in a second computing device that is configured to receive a task message from a first computing device. Based on the task message, the networking subsystem updates an entry in a task queue with task information from the task message. A processing subsystem in the second computing device subsequently retrieves the task information from the task queue and performs the corresponding task. In these embodiments, the networking subsystem processes the task message (e.g., stores the task information in the task queue) without causing the processing subsystem to perform operations for processing the task message.11-06-2014
20140344830EFFICIENT PROCESSOR LOAD BALANCING USING PREDICATION FLAGS - A system and methods embodying some aspects of the present embodiments for efficient load balancing using predication flags are provided. The load balancing system includes a first processing unit, a second processing unit, and a shared queue. The first processing unit is in communication with a first queue. The second processing unit is in communication with a second queue. The first and second queues are each configured to hold a packet. The shared queue is configured to maintain a work assignment, wherein the work assignment is to be processed by either the first or second processing unit.11-20-2014

Vinod Vaikuntanathan, White Plains, NY US

Patent application numberDescriptionPublished
20110243320Efficient Homomorphic Encryption Scheme For Bilinear Forms - In one exemplary embodiment, a computer readable storage medium tangibly embodying a program of instructions executable by a machine for performing operations including: receiving information B to be encrypted as a ciphertext C in accordance with an encryption scheme having an encrypt function; and encrypting B in accordance with the encrypt function to obtain C, the scheme utilizes at least one public key A, where B, C, and A are matrices, the encrypt function receives as inputs A and B and outputs C as C→AS+pX+B (mod q), S is a random matrix, X is an error matrix, p is in integer, q is an odd prime number. In other exemplary embodiments, the encryption scheme includes a decrypt function that receives as inputs at least one private key T (a matrix) and C and outputs B as B=T10-06-2011
20150033033Efficient Homomorphic Encryption Scheme for Bilinear Forms - In one exemplary embodiment, a computer readable storage medium tangibly embodying a program of instructions executable by a machine for performing operations including: receiving information B to be encrypted as a ciphertext C in accordance with an encryption scheme having an encrypt function; and encrypting B in accordance with the encrypt function to obtain C, the scheme utilizes at least one public key A, where B, C, and A are matrices, the encrypt function receives as inputs A and B and outputs C as C←AS+pX+B(mod q), S is a random matrix, X is an error matrix, p is in integer, q is an odd prime number. In other exemplary embodiments, the encryption scheme includes a decrypt function that receives as inputs at least one private key T (a matrix) and C and outputs B as B=T01-29-2015

Vinod Vaikuntanathan, Toronto CA

Patent application numberDescriptionPublished
20130097417SECURE PRIVATE COMPUTATION SERVICES - An encryption scheme allows meaningful, efficient computation of encrypted data in various application domains, including without limitation patient health care, financial analysis, market research, and targeted advertising. Data providers, computational services, and results consumers work in concert using a somewhat homomorphic encryption scheme to preserve the secrecy while providing practical computational performance. Encrypted data is stored within network-accessible storage. The data is encrypted using an encryption scheme that allows predictive analysis on the encrypted data without decrypting the encrypted data. The predictive analysis includes evaluation of polynomials of bounded degree on elements of the encrypted data. The evaluation includes ciphertext addition compositions and a bounded number of ciphertext multiplication compositions. The predictive analysis is performed on the encrypted data without decrypting the encrypted data to create encrypted results, which are transmitted to an entity possessing a decryption key capable of decrypting the encrypted results.04-18-2013

Vinod Vaikuntanathan, Seattle, WA US

Patent application numberDescriptionPublished
20120155635ATTRIBUTE BASED ENCRYPTION USING LATTICES - A master public key is generated as a first set of lattices based on a set of attributes, along with a random vector. A master secret key is generated as a set of trap door lattices corresponding to the first set of lattices. A user secret key is generated for a user's particular set of attributes using the master secret key. The user secret key is a set of values in a vector that are chosen to satisfy a reconstruction function for reconstructing the random vector using the first set of lattices. Information is encrypted to a given set of attributes using the user secret key, the given set of attributes and the user secret key. The information is decrypted by a second user having the given set of attributes using the second user's secret key.06-21-2012
20120155641NON-INTERACTIVE VERIFIABLE, DELEGATED COMPUTATION - A processor on a delegator receives an input upon which an expensive function is to be evaluated. The delegator incorporates the input into a request to perform a task that is different from evaluating the function. When the task is performed, it provides a secondary result that is observable by the delegator. The secondary result is different from an answer to the expensive function and can be verified by the delegator with less computational expense than evaluation of the expensive function. The task can be performed by the server only after the server has verifiably evaluated the function based on the input. Request data, that is indicative of the request to perform a task with the input incorporated therein is transmitted to the server for performance of the task. The delegator then receives a returned result from the server indicative of the server performing the task. The returned result has a value that reflects both an answer to which the server has evaluated the function, and whether the answer is verified as being correct.06-21-2012
20120159179DIGITAL SIGNATURES WITH ERROR POLYNOMIALS - Representations of polynomials a, s, t, e06-21-2012
20120331283USER-CONTROLLED DATA ENCRYPTION WITH OBFUSCATED POLICY - An obfuscated policy data encryption system and method for re-encrypting data to maintain the confidentiality and integrity of data about a user when the data is stored in a public cloud computing environment. The system and method allow a user to specify in a data-sharing policy who can obtain the data and how much of the data is available to them. This policy is obfuscated such that it is unintelligible to the cloud operator and others processing and storing the data. In some embodiments, a patient species with whom his health care data should be shared with and the encrypted health care data is stored in the cloud in an electronic medical records system. The obfuscated policy allows the electronic medial records system to dispense the health care data of the patient to those requesting the data without disclosing the details of the policy itself.12-27-2012
20140129845ATTRIBUTE BASED ENCRYPTION USING LATTICES - A master public key is generated as a first set of lattices based on a set of attributes, along with a random vector. A master secret key is generated as a set of trap door lattices corresponding to the first set of lattices. A user secret key is generated for a user's particular set of attributes using the master secret key. The user secret key is a set of values in a vector that are chosen to satisfy a reconstruction function for reconstructing the random vector using the first set of lattices. Information is encrypted to a given set of attributes using the user secret key, the given set of attributes and the user secret key. The information is decrypted by a second user having the given set of attributes using the second user's secret key.05-08-2014

Vinod Valloppillil, San Francisco, CA US

Patent application numberDescriptionPublished
20090030792CONTENT RECOMMENDATION SERVICE - A method and system for content recommendation make such recommendations possible, even if users are in different geographic locations, use different network service providers and different services, user different types of device, etc. A method for communicating a content recommendation comprises receiving a recommendation for content, the content recommendation originating from a first client device communicating using a first network and destined for a second client device communicating using a second network, determining access information for the second client device to access the content using the second network, and transmitting the determined access information.01-29-2009
20090030931MULTI-SOURCE MULTI-NETWORK ELECTRONIC SERVICE GUIDE - A method and system by which a client device can gather ESG data from disparate sources and present them to a user in a unified manner via a single user interface provides improved usability of the ESG. A method for providing an electronic service guide comprises acquiring a plurality of electronic service guides, translating each of the plurality of electronic service guides that was not acquired in a specified representation to the specified representation, combining the plurality of electronic service guides in the specified representation to form a unified electronic service guide, and providing the unified electronic service guide for display.01-29-2009
20120122490LOCATION SPECIFIC EVENT BROADCASTING - Applications in a broadcast environment distribute events in real-time to a large number of receivers within specified geographic locations while efficiently sharing bandwidth resources with other applications using the same broadcast network. Applications need not be aware of the other applications sharing the resources, nor of the methods, protocols, and other mechanisms used to actually broadcast the data over the broadcast medium. Server-side applications that serve data, send notifications, or distribute events to specific locations within the network use a broadcast location manager. Client applications that receive such data, notifications, or events use a client location filter to obtain events that are relevant based on the location of the device. The broadcast location manager and client location filter work together to reliably and efficiently transmit data, notifications, and events to specific locations over the broadcast network for all applications involved.05-17-2012
20120230195RELIABLE EVENT BROADCASTER WITH MULTIPLEXING AND BANDWIDTH CONTROL FUNCTIONS - Data may be transmitted in a broadcast mode to multiple devices operating in a network. Efficient utilization of bandwidth while providing a desired level of quality of service is enabled for the applications executing on the devices that utilize the broadcasted data. A set of bandwidth constraints may be utilized in combination with a set of heuristics and rules for the allocation and re-allocation of bandwidth among multiple applications in a manner that minimizes the impact on the quality of service metrics of importance to the affected applications when contention exists for the network resources. Quality of service provided to each application may be degraded smoothly, with certain priorities and guarantees being maintained. Event segmentation and reassembly functions for applications may be provided, as well as reliability mechanisms to increase the ability to provide data to client devices that have not been actively receiving for significant periods of time.09-13-2012
20130166735LOCATION SPECIFIC EVENT BROADCASTING - Applications in a broadcast environment distribute events in real-time to a large number of receivers within specified geographic locations while efficiently sharing bandwidth resources with other applications using the same broadcast network. Applications need not be aware of the other applications sharing the resources, nor of the methods, protocols, and other mechanisms used to actually broadcast the data over the broadcast medium. Server-side applications that serve data, send notifications, or distribute events to specific locations within the network use a broadcast location manager. Client applications that receive such data, notifications, or events use a client location filter to obtain events that are relevant based on the location of the device. The broadcast location manager and client location filter work together to reliably and efficiently transmit data, notifications, and events to specific locations over the broadcast network for all applications involved.06-27-2013
20140125590SYSTEMS AND METHODS FOR ALTERNATIVE CONTROL OF TOUCH-BASED DEVICES - A computer-implemented method, a system, and software includes providing output from a touch-based device to an external display; detecting gestures from a user located away from and not physically touching the touch-based device; and translating the detected gestures into appropriate commands for the touch-based device. The systems and methods provide alternative control of touch-based devices such as mobile devices. The systems and methods can include a mobile device coupled to an external display device and controlled via user gestures monitored by a collocated sensor. Accordingly, the systems and methods allow users to operate applications (“apps”) on the mobile device displayed on the external display device and controlled without touching the mobile device using gestures monitored by the collocated sensor. This enables the wide variety of rich apps to be operated in a new manner.05-08-2014

Patent applications by Vinod Valloppillil, San Francisco, CA US

Vinod Vasnani, Singapore SG

Patent application numberDescriptionPublished
20090307024SYSTEM AND METHOD FOR PRESENTING INFORMATION ABOUT CONSERVATION ACTIVITIES OF AN ORGANIZATION - A system is provided for presenting information about waste reduction or resource preservation activities of one or more entities. The system may include at least one server resource that is programmed to generate a presentation for an online medium. The presentation may provide at least a first information item that is indicative of a determination of a reduction by a given entity in either of an identified waste byproduct or a resource consumption. The reduction is a result of one or more kinds of a conservation activity that is performed by one or more individuals in the organization.12-10-2009

Vinod Vibhute, Bangalore IN

Patent application numberDescriptionPublished
20130126548MULTI-PIECE DISPENSER FOR USE WITH A CONSUMABLE PRODUCT - A multi-piece dispenser for confectionary products including a housing defining an inner chamber for storing a multi-piece package of confectionary product including a slot for receiving an end portion of the multi-piece package for dispensing the confectionary product and a retention member for retaining the end portion of the package within the slot for further dispensing.05-23-2013

Vinod Vijayakumaran, Bangalore IN

Patent application numberDescriptionPublished
20140040453DOWNTIME CALCULATOR - A downtime calculator for a computer network system has a downtime request module, a user activity computation engine, and a downtime computation engine. The downtime request module receives attributes of a downtime request for the computer network system. The user activity computation engine determines activities of the computer network system based on geographic regions and local times of users accessing the computer network system. The downtime computation engine calculates a recommended downtime of the computer network system based on the attributes of the downtime request and user activities on the computer network system.02-06-2014

Vinod Vijayarajan, Boulder, CO US

Patent application numberDescriptionPublished
20120227053DISTRIBUTED RESOURCE MANAGEMENT IN A PORTABLE COMPUTING DEVICE - In a portable computing device having a node-based resource architecture, a first or distributed node controlled by a first processor but corresponding to a second or native node controlled by a second processor is used to indirectly access a resource of the second node. In a resource graph defining the architecture each node represents an encapsulation of functionality of one or more resources, each edge represents a client request, and adjacent nodes represent resource dependencies. Resources defined by a first graph are controlled by the first processor but not the second processor, while resources defined by a second graph are controlled by the second processor but not the first processor. A client request on the first node may be received from a client under control of the first processor. Then, a client request may be issued on the second node in response to the client request on the first node.09-06-2012
20120239812BATCHING RESOURCE REQUESTS IN A PORTABLE COMPUTING DEVICE - In a portable computing device having a node-based resource architecture, resource requests are batched or otherwise transactionized to help minimize inter-processing entity messaging or other messaging or provide other benefits. In a resource graph defining the architecture, each node or resource of the graph represents an encapsulation of functionality of one or more resources controlled by a processor or other processing entity, each edge represents a client request, and adjacent nodes of the graph represent resource dependencies. A single transaction of resource requests may be provided against two or more of the resources.09-20-2012
20130019249System and Method For Managing Resources of A Portable Computing Device - A method and system for managing resources of a portable computing device is disclosed. The method includes receiving node structure data for forming a node, in which the node structure data includes a unique name assigned to each resource of the node. A node has at least one resource and it may have multiple resources. Each resource may be a hardware or software element. The system includes a framework manger which handles the communications between existing nodes within a node architecture. The framework manager also logs activity of each resource by using its unique name. The framework manager may send this logged activity to an output device, such as a printer or a display screen. The method and system may help reduce or eliminate a need for customized APIs when a new hardware or software element (or both) are added to a portable computing device.01-17-2013
20130031560Batching and Forking Resource Requests In A Portable Computing Device - In a portable computing device having a node-based resource architecture, resource requests are batched or otherwise transactionized to help minimize inter-processing entity messaging or other messaging or provide other benefits. In a resource graph defining the architecture, each node or resource of the graph represents an encapsulation of functionality of one or more resources controlled by a processor or other processing entity, each edge represents a client request, and adjacent nodes of the graph represent resource dependencies. A single transaction of resource requests may be provided against two or more of the resources. Additionally, this single transaction may become forked so that parallel processing among a client issuing the single transaction and the resources handling the requests of the single transaction may occur.01-31-2013
20130061235METHOD AND SYSTEM FOR MANAGING PARALLEL RESOURCE REQUESTS IN A PORTABLE COMPUTING DEVICE - A method and system for managing parallel resource requests in a portable computing device (“PCD”) are described. The system and method includes generating a first request from a first client, the first request issued in the context of a first execution thread. The first request may be forwarded to a resource. The resource may acknowledge the first request and initiate asynchronous processing. The resource may process the first request while allowing the first client to continue processing in the first execution thread. The resource may signal completion of the processing of the first request and may receive a second request. The second request causes completion of the processing of the first request. The completion of the processing of the first request may include updating a local representation of the resource to a new state and invoking any registered callbacks. The resource may become available to service the second request, and may process the second request.03-07-2013
20130227583Method and System For Scheduling Requests In A Portable Computing Device - A method and system for managing requests among resources within a portable computing device include a scheduler receiving data from a client for scheduling a plurality of requests. Each request identifies at least one resource and a requested deadline. Next, data from the client is stored by the scheduler in a database. The scheduler then determines times and a sequence for processing the requests based on requested deadlines in the requests and based on current states of resources within the portable computing device. The scheduler then communicates the requests to the resources at the determined times and according to the determined sequence. The scheduler, at its discretion, may schedule a request after its requested deadline in response to receiving a new request command from a client. The scheduler may allow a sleep set corresponding to a sleep processor state to power off a processor.08-29-2013
20130283276METHOD AND SYSTEM FOR MINIMAL SET LOCKING WHEN BATCHING RESOURCE REQUESTS IN A PORTABLE COMPUTING DEVICE - Requests of a PCD are determined if they are part of a transaction involving a plurality of resources. Next, each resource that is part of the request involving multiple resources is identified. As each resource is identified, a framework manager determines if a resource has completed processing the request directed at it. If the resource has returned a value that it has completed the request, then the framework manager allows the resource to return to an unlocked state while other requests in the transaction are being processed. If the resource has not completed processing and has deferred some of the processing to the end of the transaction, then the resource is added to a deferred unlock list. It is determined if the resource is a dependent on another resource in the current request path. If it is dependent, then the other resource is also placed on the deferred unlock list.10-24-2013

Vinod Yegneswaran, Foster City, CA US

Patent application numberDescriptionPublished
20120030760METHOD AND APPARATUS FOR COMBATING WEB-BASED SURREPTITIOUS BINARY INSTALLATIONS - The present invention relates to a method and apparatus for combating web-based surreptitious binary installations. One embodiment of a method combating web-based surreptitious binary installations on a computing device includes intercepting a download of a file to a local file system of the computing device, storing the file in the local file system when the file is correlated with a user consent, and storing the file in a secure zone of the computing device when the file is not correlated with a user consent, wherein files stored in the secure zone cannot be executed or propagated.02-02-2012
20140075498SECURITY MEDIATION FOR DYNAMICALLY PROGRAMMABLE NETWORK - A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.03-13-2014
20140075519SECURITY MEDIATION FOR DYNAMICALLY PROGRAMMABLE NETWORK - A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.03-13-2014
Website © 2016 Advameg, Inc.