Patents by Inventor Amir Khan
Amir Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200407598Abstract: The present invention relates to a pleated sealing tape for providing a waterproof covering. The pleated sealing tape includes a flexible sheet made of a polymeric material and having a plurality of pleats extending from a first end of the sheet to an opposing end of the sheet. The pleated sealing tape also has a front surface and a rear surface, and the rear surface of the sheet includes a pressure-sensitive adhesive. When the sheet is applied to a surface, the sheet is configured to be removed by stretching the sheet in a direction transverse to the orientation of the plurality of pleats and subsequently peeling the sheet off of the surface.Type: ApplicationFiled: May 11, 2020Publication date: December 31, 2020Inventors: Prabani Dissanayake, Lirije Kabashi, Amir Khan, Sean Hyer
-
Publication number: 20200374109Abstract: A method for securing communications for a given network topology is provided. The method comprises generating by a node N(i) of the network, security parameters for the node N(i); transmitting by the node N(i), said security parameters to a controller for the network; maintaining by the controller said security parameters for the node N(i); receiving by the controller a request from a node N(j) for the security parameters for the node N(i); retrieving by the controller the security parameters for the node N(i); and transmitting by the controller said security parameters to the node N(j).Type: ApplicationFiled: August 7, 2020Publication date: November 26, 2020Inventors: Syed Khalid Raza, Praveen Raju Kariyanahalli, Rameshbabu Prabagaran, Amir Khan
-
Patent number: 10837778Abstract: A method for operating a fiber optic gyroscope to measure angular velocity uses a closed-loop modulation scheme. Two-state modulation voltages are applied to an optical modulator and continuously adjusted to maintain a null difference between corresponding demodulated voltages from a photodetector. If one of the modulation voltages reaches a threshold voltage, the continuous nulling adjustment is interrupted briefly while the two-state modulation voltages are reset to values that correspond to relative phases of ?/2 and ??/2 when the gyroscope is stationary, then the continuous adjustment is resumed. This reoccurring resetting, while the gyroscope accelerates or decelerates, substantially increases the dynamic range over which the gyroscope can precisely measure angular velocity.Type: GrantFiled: April 12, 2019Date of Patent: November 17, 2020Assignee: NufernInventors: Jan Amir Khan, David Paquette
-
Publication number: 20200283757Abstract: The present disclosure relates to a method of generating an antibody library, not limiting to a human naïve antibody gene expression library encompassing a pool of nucleic acid sequences derived from a natural antibody repertoire comprising humoral immunity from healthy and genetically diverse human populations. More specifically, the method employs a combination of phage and/or yeast antibody surface display concept which allows to screen large antibody library size and facilitates better folding of antibody structure. The present disclosure also relates to a human naïve antibody library generated by employing the process of the present disclosure, a set of primers employed in the method and application(s) of said antibody library.Type: ApplicationFiled: December 21, 2015Publication date: September 10, 2020Inventors: Sohang CHATTERJEE, Kavitha Iyer RODRIGUES, Maloy GHOSH, Sunit MAITY, Divya UNNIKRISHNAN, Yogendra Manjunath BANGALORE MUNIRAJU, Sathyabalan MURUGESAN, Pavithra MUKUNDA, Bhargav PRASAD, Veeresha KAMANAGOWDA, Sanghamitra BHATTACHARJEE, Pravin Kumar DAKSHINAMURTHY, Vivek HALAN, Sankaranarayanan SRINIVASAN, Anuradha HORA, Bairavabalakumar NATARAJAN, Karthika NAIR, Aswini THANIGAIVEL, Amol MALIWALAVE, Bharath Ravindra SHENOY, Sahana Bhima RAO, Subhra Prakash CHAKRABARTY, Ashvini Kumar DUBEY, Amir KHAN, Anurag TIWARI, Santosh KUMAR, Shivani PATEL, Nikitha M
-
Patent number: 10742402Abstract: A method for securing communications for a given network topology is provided. The method comprises generating by a node N(i) of the network, security parameters for the node N(i); transmitting by the node N(i), said security parameters to a controller for the network; maintaining by the controller said security parameters for the node N(i); receiving by the controller a request from a node N(j) for the security parameters for the node N(i); retrieving by the controller the security parameters for the node N(i); and transmitting by the controller said security parameters to the node N(j).Type: GrantFiled: January 26, 2018Date of Patent: August 11, 2020Assignee: Cisco Technology, Inc.Inventors: Syed Khalid Raza, Praveen Raju Kariyanahalli, Rameshbabu Prabagaran, Amir Khan
-
Patent number: 10685698Abstract: An apparatus includes a plurality of coarse delay circuits and a phase blender circuit. The coarse delay circuits may be configured to (i) receive an input clock signal, (ii) receive a plurality of control signals and (iii) generate a first phase signal and a second phase signal. The phase blender circuit may be configured to (i) receive the first phase signal and the second phase signal, (ii) receive a phase control signal, (iii) step between stages implemented by the coarse delay circuits and (iv) present an output clock signal. The phase blender circuit may mitigate a mismatch between the stages of the coarse delay circuits by interpolating an amount of coarse delay provided by the coarse delay circuits.Type: GrantFiled: October 10, 2018Date of Patent: June 16, 2020Assignee: Integrated Device Technology, Inc.Inventors: Steven Ernest Finn, Mohammed Amir Khan
-
Publication number: 20200149032Abstract: The present disclosure relates to a method of generating an antibody library, not limiting to a synthetic antibody gene expression library built on pool of consensus nucleic acid sequences by using codon replacement technology. The present disclosure also relates to a synthetic antibody library generated by employing the method of the present disclosure and application(s) of said antibody library.Type: ApplicationFiled: January 19, 2017Publication date: May 14, 2020Inventors: Sohang CHATTERJEE, Kavitha IYER RODRIGUES, Maloy GHOSH, Sunit MAITY, Divya UNNIKRISHNAN, Yogendra MANJUNATH BANGALORE MUNIRAJU, Sathyabalan MURUGESAN, Pavithra MUKUNDA, Bhargav PRASAD, Veeresha KAMANAGOWDA, Sanghamitra BHATTACHARJEE, Pravin KUMAR DAKSHINAMURTHY, Vivek HALAN, Sankaranarayanan SRINIVASAN, Anuradha HORA, Bairavabalakumar NATARAJAN, Karthika NAIR, Aswini THANIGAIVEL, MALIWALAVE Amol, Bharath RAVINDRA SHENOY, Sahana BHIMA RAO, Subhra PRAKASH CHAKRABARTY, Ashvini KUMAR DUBEY, Amir KHAN, Ankurina SHARMA, Rashmi SHARMA, Anurag TIWARI, Santosh KUMAR, Shivani PATEL, Nikitha MARKANDA
-
Publication number: 20200118612Abstract: An apparatus includes a plurality of coarse delay circuits and a phase blender circuit. The coarse delay circuits may be configured to (i) receive an input clock signal, (ii) receive a plurality of control signals and (iii) generate a first phase signal and a second phase signal. The phase blender circuit may be configured to (i) receive the first phase signal and the second phase signal, (ii) receive a phase control signal, (iii) step between stages implemented by the coarse delay circuits and (iv) present an output clock signal. The phase blender circuit may mitigate a mismatch between the stages of the coarse delay circuits by interpolating an amount of coarse delay provided by the coarse delay circuits.Type: ApplicationFiled: October 10, 2018Publication date: April 16, 2020Inventors: Steven Ernest Finn, Mohammed Amir Khan
-
Publication number: 20200036686Abstract: A method for operating a network is provided. The method comprises segmenting the network into a plurality of virtual private networks, wherein each virtual private network runs on an underlying physical network; and wherein each virtual private network represents a particular context; and configuring at least some nodes within the network to send and receive traffic based on context.Type: ApplicationFiled: August 9, 2019Publication date: January 30, 2020Inventors: Lars Olof Stefan Olofsson, Atif Khan, Syed Khalid Raza, Himanshu H. Shah, Amir Khan, Nehal Bhau
-
Publication number: 20190316907Abstract: A method for operating a fiber optic gyroscope to measure angular velocity uses a closed-loop modulation scheme. Two-state modulation voltages are applied to an optical modulator and continuously adjusted to maintain a null difference between corresponding demodulated voltages from a photodetector. If one of the modulation voltages reaches a threshold voltage, the continuous nulling adjustment is interrupted briefly while the two-state modulation voltages are reset to values that correspond to relative phases of ?/2 and ??/2 when the gyroscope is stationary, then the continuous adjustment is resumed. This reoccurring resetting, while the gyroscope accelerates or decelerates, substantially increases the dynamic range over which the gyroscope can precisely measure angular velocity.Type: ApplicationFiled: April 12, 2019Publication date: October 17, 2019Applicant: NufernInventors: Jan Amir KHAN, David PAQUETTE
-
Patent number: 10395331Abstract: Embodiments include method, systems and computer program products for selective retention of data in a computational system. Aspects include receiving a monitored data element. Aspects also include assigning an initial storage ranking to the monitored data element to create a ranked data element. Aspects also include determining a threshold storage ranking. Aspects also include comparing the initial storage ranking to the threshold storage ranking. Aspects also include, based on the comparison indicating that the initial storage ranking is greater than the threshold storage ranking, storing the ranked data element in a long-term storage. Aspects also include based upon the comparison indicating that the initial storage ranking is less than the threshold storage ranking, discarding the ranked data element.Type: GrantFiled: December 4, 2015Date of Patent: August 27, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Suzanne C. Deffeyes, Amir Khan, Charles S. Lingafelt, Gary K. Thornton
-
Publication number: 20190173910Abstract: Embodiments for managing computing network security by one or more processors are described. A signal that is representative of authorized anomalous behavior is received. The signal includes at least one of an identity and a type of activity associated with the authorized anomalous behavior. A security incident is detected. If the detected security incident corresponds to the authorized anomalous behavior, the generating of an alert in response to the detecting of the security incident is suppressed.Type: ApplicationFiled: December 6, 2017Publication date: June 6, 2019Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Steven LINGAFELT, Suzanne C. DEFFEYES, Gary K. THORNTON, Amir KHAN
-
Publication number: 20190119691Abstract: The present disclosure relates to vectors for cloning and expressing genetic material including but not limiting to antibody gene or parts thereof and methods of generating said vectors. Said vectors express the antibody genes in different formats such as Fab or scFv as a part of intertransfer system, intratransfer system or direct cloning and expression in individual display systems. In particular, phage display technology is used to clone and screen potential antibody genes in phagemid which is followed by the transfer of said genes to yeast vector for further screening and identification of lead molecules against antigens. The present vectors have numerous advantages including uniquely designed inserts/expression cassettes resulting in efficient and smooth transfer of clonal population from phage to yeast vectors resulting in efficient library preparation and identification of lead molecules.Type: ApplicationFiled: April 6, 2017Publication date: April 25, 2019Inventors: Sohang CHATTERJEE, Kavitha Iyer RODRIGUES, Maloy GHOSH, Sunit MAITY, Divya UNNIKRISHNAN, Yogendra Manjunath Bangalore MUNIRAJU, Sathyabalan MURUGESAN, Pavithra MUKUNDA, Bhargav PRASAD, Veeresha KAMANAGOWDA, Sanghamitra BHATTACHARJEE, Pravin Kumar DAKSHINAMURTHY, Vivek HALAN, Sankaranarayanan SRINIVASAN, Anuradha HORA, Bairavabalakumar NATARAJAN, Karthika NAIR, Aswini THANIGAIVEL, Amol MALIWALAVE, Bharath Ravindra SHENOY, Sahana Bhima RAO, Subhra Prakash CHAKRABARTY, Ashvini Kumar DUBEY, Amir KHAN, Ankurina SHARMA, Rashmi SHARMA, Anurag TIWARI, Santosh KUMAR, Shivani PATEL, Nikitha M
-
Patent number: 10142254Abstract: A method for routing is disclosed. The method comprises establishing an overlay network, comprising a plurality of network elements and an overlay controller; wherein the overlay controller is in communication with each network element via a secure tunnel established through an underlying transport network; receiving by the overlay controller, information from each service-hosting network element information said information identifying a service hosted at that service-hosting network element, and label associated with the service-hosting network element; identifying by the overlay controller, at least one policy that associates traffic from a site with a service; and causing by said overly controller, the at least one policy to be executed so that traffic from the site identified in the policy is routed using the underlying transport network to the service-hosting network element associated with the said service.Type: GrantFiled: September 16, 2013Date of Patent: November 27, 2018Assignee: CISCO TECHNOLOGY, INC.Inventors: Lars Olof Stefan Olofsson, Atif Khan, Syed Khalid Raza, Himanshu H. Shah, Amir Khan, Nehal Bhau
-
Publication number: 20180302378Abstract: A method for operating a network is provided. The method comprises segmenting the network into a plurality of virtual private networks, wherein each virtual private network runs on an underlying physical network; and wherein each virtual private network represents a particular context; and configuring at least some nodes within the network to send and receive traffic based on context.Type: ApplicationFiled: April 9, 2018Publication date: October 18, 2018Applicant: Cisco Technology, Inc.Inventors: Lars Olof Stefan OLOFSSON, Atif KHAN, Syed Khalid RAZA, Himanshu H. SHAH, Amir KHAN, Nehal BHAU
-
Publication number: 20180171028Abstract: The present disclosure relates to methods of obtaining cell with disrupted fucosylation and obtaining afucosylated protein. The present disclosure employs the Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) technology in a protein producing cell line to produce afucosylated protein. The resulting protein, specifically the resulting monoclonal antibody is completely afucosylated and reveals higher degree of antibody dependent cellular cytotoxicity.Type: ApplicationFiled: May 13, 2016Publication date: June 21, 2018Inventors: Sohang Chatterjee, Kavitha Iyer Rodrigues, Maloy Ghosh, Sunit Maity, Divya Unnikrishnan, Jahnabi Hazarika, Yogendra Manjunath Bangalore Muniraju, Sathyabalan Murugesan, Pavithra Mukunda, Bhargav Prasad, Veeresha Kamanagowda, Sanghamitra Bhattacharjee, Pravin Kumar Dakshinamurthy, Vivek Halan, Sankaranarayanan Srinivasan, Anuradha Hora, Bairavabalakumar Natarajan, Karthika Nair, Aswini Thanigaivel, Amol Maliwalave, Bharath Ravindra Shenoy, Sahana Bhima Rao, Subhra Prakash Chakrabarty, Ashvini Kumar Dubey, Amir Khan, Ankurina Sharma
-
Publication number: 20180167206Abstract: A method for securing communications for a given network topology is provided. The method comprises generating by a node N(i) of the network, security parameters for the node N(i); transmitting by the node N(i), said security parameters to a controller for the network; maintaining by the controller said security parameters for the node N(i); receiving by the controller a request from a node N(j) for the security parameters for the node N(i); retrieving by the controller the security parameters for the node N(i); and transmitting by the controller said security parameters to the node N(j).Type: ApplicationFiled: January 26, 2018Publication date: June 14, 2018Applicant: VIPTELA INC.Inventors: Syed Khalid RAZA, Praveen Raju KARIYANAHALLI, Rameshbabu PRABAGARAN, Amir KHAN
-
Patent number: 9942201Abstract: A method for operating a network is provided. The method comprises segmenting the network into a plurality of virtual private networks, wherein each virtual private network runs on an underlying physical network; and wherein each virtual private network represents a particular context; and configuring at least some nodes within the network to send and receive traffic based on context.Type: GrantFiled: December 16, 2015Date of Patent: April 10, 2018Inventors: Lars Olof Stefan Olofsson, Atif Khan, Syed Khalid Raza, Himanshu H. Shah, Amir Khan, Nehal Bhau
-
Patent number: 9882713Abstract: A method for securing communications for a given network topology is provided. The method comprises generating by a node N(i) of the network, security parameters for the node N(i); transmitting by the node N(i), said security parameters to a controller for the network; maintaining by the controller said security parameters for the node N(i); receiving by the controller a request from a node N(j) for the security parameters for the node N(i); retrieving by the controller the security parameters for the node N(i); and transmitting by the controller said security parameters to the node N(j).Type: GrantFiled: January 30, 2013Date of Patent: January 30, 2018Assignee: VIPTELA INC.Inventors: Syed Khalid Raza, Praveen Raju Kariyanahalli, Rameshbabu Prabagaran, Amir Khan
-
Publication number: 20170161858Abstract: Embodiments include method, systems and computer program products for selective retention of data in a computational system. Aspects include receiving a monitored data element. Aspects also include assigning an initial storage ranking to the monitored data element to create a ranked data element. Aspects also include determining a threshold storage ranking. Aspects also include comparing the initial storage ranking to the threshold storage ranking. Aspects also include, based on the comparison indicating that the initial storage ranking is greater than the threshold storage ranking, storing the ranked data element in a long-term storage. Aspects also include based upon the comparison indicating that the initial storage ranking is less than the threshold storage ranking, discarding the ranked data element.Type: ApplicationFiled: December 4, 2015Publication date: June 8, 2017Inventors: Suzanne C. Deffeyes, Amir Khan, Charles S. Lingafelt, Gary K. Thornton