Patents by Inventor Ashok Ramadass
Ashok Ramadass has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11615349Abstract: Methods, systems, and devices for a cross-linked distributed ledger. The cross-referencing system includes multiple computing devices including a first computing device and a second computing device. A computing device of the multiple computing devices is configured to maintain a first cross-linked distributed ledger. The first cross-linked distributed ledger has a first set of multiple linked records that are associated with a first identifier. The first computing device includes a processor. The processor is configured to link or provide a first record associated with the first identifier to the first cross-linked distributed ledger. The first record has a first reference to a second record. The second record is within a second set of multiple cross-linked records of a second cross-linked distributed ledger.Type: GrantFiled: November 26, 2018Date of Patent: March 28, 2023Assignee: Toyota Motor North America, Inc.Inventors: Neil Dutta, Senthilkumar Gopal Kalaimani, Emily S. Lerner, Mathew Gardner, Ashok Ramadass, Michael C. Edwards, Mark A. McClung, Ryan Wheeler
-
Patent number: 10769949Abstract: Systems and methods for collaborative parking assistance using a parking facilitation circuit are provided. A method may include: using information from a plurality of sensors to locate one or more available parking spaces in a determined area; characterize the located available parking spaces to generate parking space parameters for each of the available parking spaces; generating a parking space map comprising an indication of available parking spaces, locations of the available parking spaces and parking space parameters for the available parking spaces; filtering the parking space map to include as available parking spaces only those one or more available parking spaces that, based on the parking space parameters, are compatible with a vehicle intended to park in the determined area; and providing the filtered parking space map to a user interface of the vehicle.Type: GrantFiled: December 19, 2018Date of Patent: September 8, 2020Assignee: TOYOTA MOTOR NORTH AMERICA, INC.Inventors: Michael C. Edwards, Randall M. Harris, Nutonya L. Parker, Ashok Ramadass, Kotaro Hashimoto, James H. Kikuma
-
Publication number: 20200202716Abstract: Systems and methods for collaborative parking assistance using a parking facilitation circuit are provided. A method may include: using information from a plurality of sensors to locate one or more available parking spaces in a determined area; characterize the located available parking spaces to generate parking space parameters for each of the available parking spaces; generating a parking space map comprising an indication of available parking spaces, locations of the available parking spaces and parking space parameters for the available parking spaces; filtering the parking space map to include as available parking spaces only those one or more available parking spaces that, based on the parking space parameters, are compatible with a vehicle intended to park in the determined area; and providing the filtered parking space map to a user interface of the vehicle.Type: ApplicationFiled: December 19, 2018Publication date: June 25, 2020Inventors: Michael C. Edwards, Randall M. Harris, Nutonya L. Parker, Ashok Ramadass, Kotaro Hashimoto, James H. Kikuma
-
Publication number: 20200164886Abstract: Methods, systems, and devices for a cross-linked distributed ledger. The cross-referencing system includes multiple computing devices including a first computing device and a second computing device. A computing device of the multiple computing devices is configured to maintain a first cross-linked distributed ledger. The first cross-linked distributed ledger has a first set of multiple linked records that are associated with a first identifier. The first computing device includes a processor. The processor is configured to link or provide a first record associated with the first identifier to the first cross-linked distributed ledger. The first record has a first reference to a second record. The second record is within a second set of multiple cross-linked records of a second cross-linked distributed ledger.Type: ApplicationFiled: November 26, 2018Publication date: May 28, 2020Inventors: Neil Dutta, Senthilkumar Gopal Kalaimani, Emily S Lerner, Mathew Gardner, Ashok Ramadass, Michael C. Edwards, Mark A. McClung, Ryan Wheeler
-
Publication number: 20200118225Abstract: According to one example, a method performed by a computing system includes receiving, via a transponder, a first order over a first wireless connection to a first device associated with a first vehicle. The method further includes determining a first distance between the transponder and the first device. The method further includes receiving, via the transponder, a second order over a second wireless connection to a second device associated with a second vehicle. The method further includes determining a second distance between the transponder and the second device. The method further includes placing the first order before the second order in a queue based on a comparison between the first distance and the second distance.Type: ApplicationFiled: October 11, 2018Publication date: April 16, 2020Inventors: Ashok Ramadass, Michael C. Edwards
-
Publication number: 20160180189Abstract: Systems, methods, and computer program products may be directed to creating an image hash. Key points can be identified at different locations within a sample image. Descriptor vectors for the key points can be identified, the descriptor vectors describing local image information around the key points, where each descriptor vector is an n-dimensional array. Key points can be generated based on hashes of data vectors that include at least one of the descriptors, where each feature is a 36×20 hash value.Type: ApplicationFiled: July 20, 2015Publication date: June 23, 2016Inventors: Steven White, Ashok Ramadass
-
Publication number: 20150220808Abstract: The invention is a method for visual image detection. The method uses several steps to collect, analyze, compare, and flag an image for inappropriate content.Type: ApplicationFiled: February 3, 2014Publication date: August 6, 2015Inventors: Steven White, Ashok Ramadass, Dilip Raghavan
-
Patent number: 9087267Abstract: Systems, methods, and computer program products may be directed to creating an image hash. Key points can be identified at different locations within a sample image. Descriptor vectors for the key points can be identified, the descriptor vectors describing local image information around the key points, where each descriptor vector is an n-dimensional array. Key points can be generated based on hashes of data vectors that include at least one of the descriptors, where each feature is a 36×20 hash value.Type: GrantFiled: June 11, 2012Date of Patent: July 21, 2015Assignee: IMAGE VISION LABS, INC.Inventors: Steven White, Ashok Ramadass
-
Patent number: 8644606Abstract: The method uses several steps to collect, analyze, compare, and flag an image for inappropriate content. The image is first collected based on detection and is analyzed via a database of inappropriate images. The collected image is scanned for skin-tone and/or texture, then the method eliminates the background of the image. The method then analyzes the curvature of the image. The next step is body part detection for inappropriate body parts. The image is then given a score based on all of the above steps. If the score is above a point, the image is flagged. If it is below a preselected point, the image is released. If the score is between the two points, it is withheld for further analysis.Type: GrantFiled: January 24, 2012Date of Patent: February 4, 2014Inventors: Steven White, Ashok Ramadass, Dilip Raghavan
-
Publication number: 20130117839Abstract: The disclosure generally describes computer-implemented methods, software, and systems for controlling access to applications on a device while the device is in motion. One example computer-implemented method includes identifying a request to access an application on a device, determining if the requested application is a motion-restricted application, upon determination that the requested application is a motion-restricted application, identifying a speed of movement associated with the device, and controlling access to the requested application based at least in part on the identified speed of movement of the device.Type: ApplicationFiled: October 26, 2012Publication date: May 9, 2013Inventors: Steven W. White, Ashok Ramadass
-
Publication number: 20130013705Abstract: A method for filtering content with a communication device includes, with the communication device, applying a filter function to a message associated with the communication device, the filter function finding at least one content element. The method further includes comparing the content element with a set of restricted content elements, and withholding the message from communication in response to determining that the content element matches one of the restricted content elements.Type: ApplicationFiled: July 9, 2012Publication date: January 10, 2013Applicant: IMAGE VISION LABS, INC.Inventors: Steven W. White, Ashok Ramadass
-
Publication number: 20120314959Abstract: Systems, methods, and computer program products may be directed to creating an image hash. Key points can be identified at different locations within a sample image. Descriptor vectors for the key points can be identified, the descriptor vectors describing local image information around the key points, where each descriptor vector is an n-dimensional array. Key points can be generated based on hashes of data vectors that include at least one of the descriptors, where each feature is a 36×20 hash value.Type: ApplicationFiled: June 11, 2012Publication date: December 13, 2012Inventors: Steven White, Ashok Ramadass
-
Publication number: 20120224769Abstract: The method uses several steps to collect, analyze, compare, and flag an image for inappropriate content. The image is first collected based on detection and is analyzed via a database of inappropriate images. The collected image is scanned for skin-tone and/or texture, then the method eliminates the background of the image. The method then analyzes the curvature of the image. The next step is body part detection for inappropriate body parts. The image is then given a score based on all of the above steps. If the score is above a point, the image is flagged. If it is below a preselected point, the image is released. If the score is between the two points, it is withheld for further analysis.Type: ApplicationFiled: January 24, 2012Publication date: September 6, 2012Inventors: Steven White, Ashok Ramadass, Dilip Raghavan