Patents by Inventor Satya Prakash Sharma

Satya Prakash Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140025542
    Abstract: A system and method for remotely auditing inventoried assets, particularly those financed by asset-based inventory lending, by capturing unique, non-clonable, auditing information with an interrogation device at an inventory location to indicate whether each asset is present or absent at the inventory location, and by sending inventory information about such assets based on the captured auditing information to an auditor.
    Type: Application
    Filed: July 17, 2012
    Publication date: January 23, 2014
    Applicant: Zortag Inc.
    Inventors: Satya Prakash Sharma, Robert James Hart
  • Publication number: 20140014715
    Abstract: The present invention refers to an apparatus for forming and reading an identification feature on or in an object. The apparatus comprises a formation unit for physically forming an identification feature on or in an object, at least one reading unit adapted to read the identification feature to form a signature, and a housing, wherein the formation unit and the at least one reading unit are both contained in the housing. The at least one reading unit can comprise at least two reading elements. The identification feature can comprise an identification feature based on inherent disorder. The invention also refers to a method of forming and reading an identification feature on or in an object.
    Type: Application
    Filed: December 16, 2011
    Publication date: January 16, 2014
    Applicant: BILCARE TECHNOLOGIES SINGAPORE PTE. LTD.
    Inventors: Peter Malcolm Moran, Narayan Numbudiri, Winston Cheng Lock Tan, Satya Prakash Sharma, Adrian Paul Burden
  • Publication number: 20130277425
    Abstract: A system and method for securing articles of commerce passing through points along a supply chain against theft, diversion, product overruns, counterfeiting and like unauthorized activity, capture authentication information and identification information associated with the articles with an interrogation device at one or more points in the supply chain. The articles may be authenticated from the captured authentication information as being authorized or unauthorized at each point, and may be identified from the captured identification information at each point. Transactional information about the article, e.g., authorized/unauthorized status and a time and place of the authentication, is reported to a brand manager/law enforcement.
    Type: Application
    Filed: April 19, 2012
    Publication date: October 24, 2013
    Applicant: Zortag Inc.
    Inventors: Satya Prakash SHARMA, Robert James Hart
  • Publication number: 20130173383
    Abstract: Authentication information and product identification information associated with a product are captured by a portable interrogation device held and operated by a user. An authentication server determines from the captured authentication information whether the product is genuine or counterfeit. In response to the authentication, a marketing server identifies the product from the captured product identification information, and sends customized transactional information about the product to the device.
    Type: Application
    Filed: January 3, 2012
    Publication date: July 4, 2013
    Applicant: Zortag Inc.
    Inventors: Satya Prakash SHARMA, Jerome Swartz
  • Patent number: 8458431
    Abstract: A system, and computer usable program product for expanding memory size are provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory.
    Type: Grant
    Filed: November 3, 2009
    Date of Patent: June 4, 2013
    Assignee: International Business Machines Corporation
    Inventors: David Alan Hepkin, Satya Prakash Sharma, Saurabh Nath Sharma, Randal Craig Swanberg
  • Patent number: 8447955
    Abstract: A multiprocessor data processing system (MDPS) with a weakly-ordered architecture providing processing logic for substantially eliminating issuing sync instructions after every store instruction of a well-behaved application. Instructions of a well-behaved application are translated and executed by a weakly-ordered processor. The processing logic includes a lock address tracking utility (LATU), which provides an algorithm and a table of lock addresses, within which each lock address is stored when the lock is acquired by the weakly-ordered processor. When a store instruction is encountered in the instruction stream, the LATU compares the target address of the store instruction against the table of lock addresses. If the target address matches one of the lock addresses, indicating that the store instruction is the corresponding unlock instruction (or lock release instruction), a sync instruction is issued ahead of the store operation.
    Type: Grant
    Filed: October 28, 2008
    Date of Patent: May 21, 2013
    Assignee: International Business Machines Corporation
    Inventors: Andrew Dunshea, Satya Prakash Sharma, Mysore Sathyanarayana Srinivas
  • Publication number: 20130087620
    Abstract: A method of, and a system and a label for, authenticating an object in situ create an authentication pattern signature for the object to be authenticated, associate a random distribution of multiple, three-dimensional elements with the object, aim a portable, handheld, image capture device at the object to capture return light from the elements as a single image, verify from the single image that the elements are three-dimensional, process the single image to generate an image pattern of the elements, compare the image pattern with the authentication pattern signature, and indicate that the object is authentic when the image pattern matches the authentication pattern signature.
    Type: Application
    Filed: October 10, 2011
    Publication date: April 11, 2013
    Applicant: ZORTAG, INC.
    Inventors: Satya Prakash SHARMA, Xianfeng GU, Robert James HART
  • Publication number: 20120216214
    Abstract: Functionality is implemented to determine that a plurality of multi-core processing units of a system are configured in accordance with a plurality of operating performance modes. It is determined that a first of the plurality of operating performance modes satisfies a first performance criterion that corresponds to a first workload of a first logical partition of the system. Accordingly, the first logical partition is associated with a first set of the plurality of multi-core processing units that are configured in accordance with the first operating performance mode. It is determined that a second of the plurality of operating performance modes satisfies a second performance criterion that corresponds to a second workload of a second logical partition of the system. Accordingly, the second logical partition is associated with a second set of the plurality of multi-core processing units that are configured in accordance with the second operating performance mode.
    Type: Application
    Filed: April 27, 2012
    Publication date: August 23, 2012
    Applicant: International Business Machines Corporation
    Inventors: Diane G. Flemming, William A. Maron, Ram Raghavan, Satya Prakash Sharma, Mysore S. Srinivas
  • Publication number: 20120210090
    Abstract: A method for expanding memory size is provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory.
    Type: Application
    Filed: April 24, 2012
    Publication date: August 16, 2012
    Applicant: International Business Machines Corporation
    Inventors: David Alan Hepkin, Satya Prakash Sharma, Saurabh Nath Sharma, Randall Craig Swanberg
  • Patent number: 8205137
    Abstract: An apparatus for improving the reliability of host data stored on Fiber Channel attached storage subsystems by performing end-to-end data integrity checks. When a read or write operation is initiated, an initial checksum for data in the read/write operation is generated and associated with the data, wherein the association exists through a plurality of layers of software and attached storage subsystems. The initial checksum is passed with the data in the read/write path. When a layer of software in the read/write path receives the initial checksum and data, the layer performs an integrity check of the data, which includes generating another checksum and comparing it to the initial checksum. If the checksums do not match, the read/write operation fails and the error is logged. If the checksums match, the integrity check is repeated through each layer in the read/write path to enable detecting data corruption at the point of source.
    Type: Grant
    Filed: November 24, 2008
    Date of Patent: June 19, 2012
    Assignee: International Business Machines Corporation
    Inventors: James Patrick Allen, Thomas Stanley Mathews, Ravi A. Shankar, Satya Prakash Sharma, Glenn Rowan Wightwick
  • Patent number: 8010673
    Abstract: A method, system and computer program product for transitioning network traffic between logical partitions in one or more data processing systems are disclosed. The method includes defining a plurality of logical partitions with respect to one or more processing units of one or more data processing systems and dynamically reallocating resources from a second partition to a first partition among the plurality of logical partitions. Packets awaiting processing are transferred from the second partition to the first partition and processed on the first partition.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: August 30, 2011
    Assignee: International Business Machines Corporation
    Inventors: Frank Dea, Rakesh Sharma, Satya Prakash Sharma, Vinit Jain
  • Publication number: 20110161979
    Abstract: Functionality is implemented to determine that a plurality of multi-core processing units of a system are configured in accordance with a plurality of operating performance modes. It is determined that a first of the plurality of operating performance modes satisfies a first performance criterion that corresponds to a first workload of a first logical partition of the system. Accordingly, the first logical partition is associated with a first set of the plurality of multi-core processing units that are configured in accordance with the first operating performance mode. It is determined that a second of the plurality of operating performance modes satisfies a second performance criterion that corresponds to a second workload of a second logical partition of the system. Accordingly, the second logical partition is associated with a second set of the plurality of multi-core processing units that are configured in accordance with the second operating performance mode.
    Type: Application
    Filed: December 31, 2009
    Publication date: June 30, 2011
    Applicant: International Business Machines Corporation
    Inventors: Diane G. Flemming, William A. Maron, Ram Raghavan, Satya Prakash Sharma, Mysore S. Srinivas
  • Publication number: 20110107054
    Abstract: A method, system, and computer usable program product for expanding memory size are provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory.
    Type: Application
    Filed: November 3, 2009
    Publication date: May 5, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Alan Hepkin, Satya Prakash Sharma, Saurabh Nath Sharma, Randal Craig Swanberg
  • Patent number: 7586936
    Abstract: An Ethernet adapter is disclosed. The Ethernet adapter comprises a plurality of layers for allowing the adapter to receive and transmit packets from and to a processor. The plurality of layers include a demultiplexing mechanism to allow for partitioning of the processor. A Host Ethernet Adapter (HEA) is an integrated Ethernet adapter providing a new approach to Ethernet and TCP acceleration. A set of TCP/IP acceleration features have been introduced in a toolkit approach: Servers TCP/IP stacks use these accelerators when and as required. The interface between the server and the network interface controller has been streamlined by bypassing the PCI bus. The HEA supports network virtualization. The HEA can be shared by multiple OSs providing the essential isolation and protection without affecting its performance.
    Type: Grant
    Filed: April 1, 2005
    Date of Patent: September 8, 2009
    Assignee: International Business Machines Corporation
    Inventors: Ravi Kumar Arimilli, Claude Basso, Jean Louis Calvignac, Chih-Jen Chang, Philippe Damon, Ronald Edward Fuhs, Satya Prakash Sharma, Natarajan Vaidhyanathan, Fabrice Jean Verplanken, Colin Beaton Verrilli, Scott Michael Willenborg
  • Publication number: 20090077661
    Abstract: A method for improving the reliability of host data stored on Fibre Channel attached storage subsystems by performing end-to-end data integrity checks. When a read or write operation is initiated, an initial checksum for data in the read/write operation is generated and associated with the data, wherein the association exists through a plurality of layers of software and attached storage subsystems. The initial checksum is passed with the data in the read/write path. When a layer of software in the read/write path receives the initial checksum and data, the layer performs an integrity check of the data, which includes generating another checksum and comparing it to the initial checksum. If the checksums do not match, the read/write operation fails and the error is logged. If the checksums match, the integrity check is repeated through each layer in the read/write path to enable detecting data corruption at the point of source.
    Type: Application
    Filed: November 24, 2008
    Publication date: March 19, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James Patrick Allen, Thomas Stanley Mathews, Ravi A. Shankar, Satya Prakash Sharma, Glenn Rowan Wightwick
  • Publication number: 20090049278
    Abstract: A multiprocessor data processing system (MDPS) with a weakly-ordered architecture providing processing logic for substantially eliminating issuing sync instructions after every store instruction of a well-behaved application. Instructions of a well-behaved application are translated and executed by a weakly-ordered processor. The processing logic includes a lock address tracking utility (LATU), which provides an algorithm and a table of lock addresses, within which each lock address is stored when the lock is acquired by the weakly-ordered processor. When a store instruction is encountered in the instruction stream, the LATU compares the target address of the store instruction against the table of lock addresses. If the target address matches one of the lock addresses, indicating that the store instruction is the corresponding unlock instruction (or lock release instruction), a sync instruction is issued ahead of the store operation.
    Type: Application
    Filed: October 28, 2008
    Publication date: February 19, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ANDREW DUNSHEA, SATYA PRAKASH SHARMA, MYSORE SATHYANARAYANA SRINIVAS
  • Patent number: 7472332
    Abstract: A method for improving the reliability of host data stored on Fiber Channel attached storage subsystems by performing end-to-end data integrity checks. When a read or write operation is initiated, an initial checksum for data in the read/write operation is generated and associated with the data, wherein the association exists through a plurality of layers of software and attached storage subsystems. The initial checksum is passed with the data in the read/write path. When a layer of software in the read/write path receives the initial checksum and data, the layer performs an integrity check of the data, which includes generating another checksum and comparing it to the initial checksum. If the checksums do not match, the read/write operation fails and the error is logged. If the checksums match, the integrity check is repeated through each layer in the read/write path to enable detecting data corruption at the point of source.
    Type: Grant
    Filed: July 26, 2005
    Date of Patent: December 30, 2008
    Assignee: International Business Machines Corporation
    Inventors: James Patrick Allen, Thomas Stanley Mathews, Ravi A. Shankar, Satya Prakash Sharma, Glenn Rowan Wightwick
  • Patent number: 7454570
    Abstract: A multiprocessor data processing system (MDPS) with a weakly-ordered architecture providing processing logic for substantially eliminating issuing sync instructions after every store instruction of a well-behaved application. Instructions of a well-behaved application are translated and executed by a weakly-ordered processor. The processing logic includes a lock address tracking utility (LATU), which provides an algorithm and a table of lock addresses, within which each lock address is stored when the lock is acquired by the weakly-ordered processor. When a store instruction is encountered in the instruction stream, the LATU compares the target address of the store instruction against the table of lock addresses. If the target address matches one of the lock addresses, indicating that the store instruction is the corresponding unlock instruction (or lock release instruction), a sync instruction is issued ahead of the store operation.
    Type: Grant
    Filed: December 7, 2004
    Date of Patent: November 18, 2008
    Assignee: International Business Machines Corporation
    Inventors: Andrew Dunshea, Satya Prakash Sharma, Mysore Sathyanarayana Srinivas
  • Publication number: 20080189417
    Abstract: A method, system and computer program product for transitioning network traffic between logical partitions in one or more data processing systems are disclosed. The method includes defining a plurality of logical partitions with respect to one or more processing units of one or more data processing systems and dynamically reallocating resources from a second partition to a first partition among the plurality of logical partitions. Packets awaiting processing are transferred from the second partition to the first partition and processed on the first partition.
    Type: Application
    Filed: March 28, 2008
    Publication date: August 7, 2008
    Inventors: Frank Dea, Rakesh Sharma, Satya Prakash Sharma, Vinit Jain
  • Patent number: 5655146
    Abstract: A coexecutor for executing functions offloaded from central processors (CPs) in a data processing system, as requested by one or more executing control programs, which include a host operating system (host OS), and subsystem programs and applications executing under the host OS. The offloaded functions are embodied in code modules. Code modules execute in the coexecutor in parallel with non-offloaded functions being executed by the CPs. Thus, the CPs do not need to execute functions which can be executed by the coexecutor. CP requests to the coexecutor specify the code modules which are accessed by the coexecutor from host shared storage under the same constraints and access limitations as the control programs. The coexecutor may emulate host dynamic address translation, and may use a provided host storage key in accessing host storage. The restricted access operating state for the coexecutor maintains data integrity.
    Type: Grant
    Filed: July 12, 1996
    Date of Patent: August 5, 1997
    Assignee: International Business Machines Corporation
    Inventors: Richard Irwin Baum, Glen Alan Brent, Hatem Mohamed Ghafir, Balakrishna Raghavendra Iyer, Inderpal Singh Narang, Gururaj Seshagiri Rao, Casper Anthony Scalzi, Satya Prakash Sharma, Bhaskar Sinha, Lee Hardy Wilson