Patents by Inventor Satya Prakash Sharma
Satya Prakash Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140025542Abstract: A system and method for remotely auditing inventoried assets, particularly those financed by asset-based inventory lending, by capturing unique, non-clonable, auditing information with an interrogation device at an inventory location to indicate whether each asset is present or absent at the inventory location, and by sending inventory information about such assets based on the captured auditing information to an auditor.Type: ApplicationFiled: July 17, 2012Publication date: January 23, 2014Applicant: Zortag Inc.Inventors: Satya Prakash Sharma, Robert James Hart
-
Publication number: 20140014715Abstract: The present invention refers to an apparatus for forming and reading an identification feature on or in an object. The apparatus comprises a formation unit for physically forming an identification feature on or in an object, at least one reading unit adapted to read the identification feature to form a signature, and a housing, wherein the formation unit and the at least one reading unit are both contained in the housing. The at least one reading unit can comprise at least two reading elements. The identification feature can comprise an identification feature based on inherent disorder. The invention also refers to a method of forming and reading an identification feature on or in an object.Type: ApplicationFiled: December 16, 2011Publication date: January 16, 2014Applicant: BILCARE TECHNOLOGIES SINGAPORE PTE. LTD.Inventors: Peter Malcolm Moran, Narayan Numbudiri, Winston Cheng Lock Tan, Satya Prakash Sharma, Adrian Paul Burden
-
Publication number: 20130277425Abstract: A system and method for securing articles of commerce passing through points along a supply chain against theft, diversion, product overruns, counterfeiting and like unauthorized activity, capture authentication information and identification information associated with the articles with an interrogation device at one or more points in the supply chain. The articles may be authenticated from the captured authentication information as being authorized or unauthorized at each point, and may be identified from the captured identification information at each point. Transactional information about the article, e.g., authorized/unauthorized status and a time and place of the authentication, is reported to a brand manager/law enforcement.Type: ApplicationFiled: April 19, 2012Publication date: October 24, 2013Applicant: Zortag Inc.Inventors: Satya Prakash SHARMA, Robert James Hart
-
Publication number: 20130173383Abstract: Authentication information and product identification information associated with a product are captured by a portable interrogation device held and operated by a user. An authentication server determines from the captured authentication information whether the product is genuine or counterfeit. In response to the authentication, a marketing server identifies the product from the captured product identification information, and sends customized transactional information about the product to the device.Type: ApplicationFiled: January 3, 2012Publication date: July 4, 2013Applicant: Zortag Inc.Inventors: Satya Prakash SHARMA, Jerome Swartz
-
Patent number: 8458431Abstract: A system, and computer usable program product for expanding memory size are provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory.Type: GrantFiled: November 3, 2009Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: David Alan Hepkin, Satya Prakash Sharma, Saurabh Nath Sharma, Randal Craig Swanberg
-
Patent number: 8447955Abstract: A multiprocessor data processing system (MDPS) with a weakly-ordered architecture providing processing logic for substantially eliminating issuing sync instructions after every store instruction of a well-behaved application. Instructions of a well-behaved application are translated and executed by a weakly-ordered processor. The processing logic includes a lock address tracking utility (LATU), which provides an algorithm and a table of lock addresses, within which each lock address is stored when the lock is acquired by the weakly-ordered processor. When a store instruction is encountered in the instruction stream, the LATU compares the target address of the store instruction against the table of lock addresses. If the target address matches one of the lock addresses, indicating that the store instruction is the corresponding unlock instruction (or lock release instruction), a sync instruction is issued ahead of the store operation.Type: GrantFiled: October 28, 2008Date of Patent: May 21, 2013Assignee: International Business Machines CorporationInventors: Andrew Dunshea, Satya Prakash Sharma, Mysore Sathyanarayana Srinivas
-
Publication number: 20130087620Abstract: A method of, and a system and a label for, authenticating an object in situ create an authentication pattern signature for the object to be authenticated, associate a random distribution of multiple, three-dimensional elements with the object, aim a portable, handheld, image capture device at the object to capture return light from the elements as a single image, verify from the single image that the elements are three-dimensional, process the single image to generate an image pattern of the elements, compare the image pattern with the authentication pattern signature, and indicate that the object is authentic when the image pattern matches the authentication pattern signature.Type: ApplicationFiled: October 10, 2011Publication date: April 11, 2013Applicant: ZORTAG, INC.Inventors: Satya Prakash SHARMA, Xianfeng GU, Robert James HART
-
Publication number: 20120216214Abstract: Functionality is implemented to determine that a plurality of multi-core processing units of a system are configured in accordance with a plurality of operating performance modes. It is determined that a first of the plurality of operating performance modes satisfies a first performance criterion that corresponds to a first workload of a first logical partition of the system. Accordingly, the first logical partition is associated with a first set of the plurality of multi-core processing units that are configured in accordance with the first operating performance mode. It is determined that a second of the plurality of operating performance modes satisfies a second performance criterion that corresponds to a second workload of a second logical partition of the system. Accordingly, the second logical partition is associated with a second set of the plurality of multi-core processing units that are configured in accordance with the second operating performance mode.Type: ApplicationFiled: April 27, 2012Publication date: August 23, 2012Applicant: International Business Machines CorporationInventors: Diane G. Flemming, William A. Maron, Ram Raghavan, Satya Prakash Sharma, Mysore S. Srinivas
-
Publication number: 20120210090Abstract: A method for expanding memory size is provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory.Type: ApplicationFiled: April 24, 2012Publication date: August 16, 2012Applicant: International Business Machines CorporationInventors: David Alan Hepkin, Satya Prakash Sharma, Saurabh Nath Sharma, Randall Craig Swanberg
-
Patent number: 8205137Abstract: An apparatus for improving the reliability of host data stored on Fiber Channel attached storage subsystems by performing end-to-end data integrity checks. When a read or write operation is initiated, an initial checksum for data in the read/write operation is generated and associated with the data, wherein the association exists through a plurality of layers of software and attached storage subsystems. The initial checksum is passed with the data in the read/write path. When a layer of software in the read/write path receives the initial checksum and data, the layer performs an integrity check of the data, which includes generating another checksum and comparing it to the initial checksum. If the checksums do not match, the read/write operation fails and the error is logged. If the checksums match, the integrity check is repeated through each layer in the read/write path to enable detecting data corruption at the point of source.Type: GrantFiled: November 24, 2008Date of Patent: June 19, 2012Assignee: International Business Machines CorporationInventors: James Patrick Allen, Thomas Stanley Mathews, Ravi A. Shankar, Satya Prakash Sharma, Glenn Rowan Wightwick
-
Patent number: 8010673Abstract: A method, system and computer program product for transitioning network traffic between logical partitions in one or more data processing systems are disclosed. The method includes defining a plurality of logical partitions with respect to one or more processing units of one or more data processing systems and dynamically reallocating resources from a second partition to a first partition among the plurality of logical partitions. Packets awaiting processing are transferred from the second partition to the first partition and processed on the first partition.Type: GrantFiled: March 28, 2008Date of Patent: August 30, 2011Assignee: International Business Machines CorporationInventors: Frank Dea, Rakesh Sharma, Satya Prakash Sharma, Vinit Jain
-
Publication number: 20110161979Abstract: Functionality is implemented to determine that a plurality of multi-core processing units of a system are configured in accordance with a plurality of operating performance modes. It is determined that a first of the plurality of operating performance modes satisfies a first performance criterion that corresponds to a first workload of a first logical partition of the system. Accordingly, the first logical partition is associated with a first set of the plurality of multi-core processing units that are configured in accordance with the first operating performance mode. It is determined that a second of the plurality of operating performance modes satisfies a second performance criterion that corresponds to a second workload of a second logical partition of the system. Accordingly, the second logical partition is associated with a second set of the plurality of multi-core processing units that are configured in accordance with the second operating performance mode.Type: ApplicationFiled: December 31, 2009Publication date: June 30, 2011Applicant: International Business Machines CorporationInventors: Diane G. Flemming, William A. Maron, Ram Raghavan, Satya Prakash Sharma, Mysore S. Srinivas
-
Publication number: 20110107054Abstract: A method, system, and computer usable program product for expanding memory size are provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory.Type: ApplicationFiled: November 3, 2009Publication date: May 5, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Alan Hepkin, Satya Prakash Sharma, Saurabh Nath Sharma, Randal Craig Swanberg
-
Patent number: 7586936Abstract: An Ethernet adapter is disclosed. The Ethernet adapter comprises a plurality of layers for allowing the adapter to receive and transmit packets from and to a processor. The plurality of layers include a demultiplexing mechanism to allow for partitioning of the processor. A Host Ethernet Adapter (HEA) is an integrated Ethernet adapter providing a new approach to Ethernet and TCP acceleration. A set of TCP/IP acceleration features have been introduced in a toolkit approach: Servers TCP/IP stacks use these accelerators when and as required. The interface between the server and the network interface controller has been streamlined by bypassing the PCI bus. The HEA supports network virtualization. The HEA can be shared by multiple OSs providing the essential isolation and protection without affecting its performance.Type: GrantFiled: April 1, 2005Date of Patent: September 8, 2009Assignee: International Business Machines CorporationInventors: Ravi Kumar Arimilli, Claude Basso, Jean Louis Calvignac, Chih-Jen Chang, Philippe Damon, Ronald Edward Fuhs, Satya Prakash Sharma, Natarajan Vaidhyanathan, Fabrice Jean Verplanken, Colin Beaton Verrilli, Scott Michael Willenborg
-
Publication number: 20090077661Abstract: A method for improving the reliability of host data stored on Fibre Channel attached storage subsystems by performing end-to-end data integrity checks. When a read or write operation is initiated, an initial checksum for data in the read/write operation is generated and associated with the data, wherein the association exists through a plurality of layers of software and attached storage subsystems. The initial checksum is passed with the data in the read/write path. When a layer of software in the read/write path receives the initial checksum and data, the layer performs an integrity check of the data, which includes generating another checksum and comparing it to the initial checksum. If the checksums do not match, the read/write operation fails and the error is logged. If the checksums match, the integrity check is repeated through each layer in the read/write path to enable detecting data corruption at the point of source.Type: ApplicationFiled: November 24, 2008Publication date: March 19, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James Patrick Allen, Thomas Stanley Mathews, Ravi A. Shankar, Satya Prakash Sharma, Glenn Rowan Wightwick
-
Publication number: 20090049278Abstract: A multiprocessor data processing system (MDPS) with a weakly-ordered architecture providing processing logic for substantially eliminating issuing sync instructions after every store instruction of a well-behaved application. Instructions of a well-behaved application are translated and executed by a weakly-ordered processor. The processing logic includes a lock address tracking utility (LATU), which provides an algorithm and a table of lock addresses, within which each lock address is stored when the lock is acquired by the weakly-ordered processor. When a store instruction is encountered in the instruction stream, the LATU compares the target address of the store instruction against the table of lock addresses. If the target address matches one of the lock addresses, indicating that the store instruction is the corresponding unlock instruction (or lock release instruction), a sync instruction is issued ahead of the store operation.Type: ApplicationFiled: October 28, 2008Publication date: February 19, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ANDREW DUNSHEA, SATYA PRAKASH SHARMA, MYSORE SATHYANARAYANA SRINIVAS
-
Patent number: 7472332Abstract: A method for improving the reliability of host data stored on Fiber Channel attached storage subsystems by performing end-to-end data integrity checks. When a read or write operation is initiated, an initial checksum for data in the read/write operation is generated and associated with the data, wherein the association exists through a plurality of layers of software and attached storage subsystems. The initial checksum is passed with the data in the read/write path. When a layer of software in the read/write path receives the initial checksum and data, the layer performs an integrity check of the data, which includes generating another checksum and comparing it to the initial checksum. If the checksums do not match, the read/write operation fails and the error is logged. If the checksums match, the integrity check is repeated through each layer in the read/write path to enable detecting data corruption at the point of source.Type: GrantFiled: July 26, 2005Date of Patent: December 30, 2008Assignee: International Business Machines CorporationInventors: James Patrick Allen, Thomas Stanley Mathews, Ravi A. Shankar, Satya Prakash Sharma, Glenn Rowan Wightwick
-
Patent number: 7454570Abstract: A multiprocessor data processing system (MDPS) with a weakly-ordered architecture providing processing logic for substantially eliminating issuing sync instructions after every store instruction of a well-behaved application. Instructions of a well-behaved application are translated and executed by a weakly-ordered processor. The processing logic includes a lock address tracking utility (LATU), which provides an algorithm and a table of lock addresses, within which each lock address is stored when the lock is acquired by the weakly-ordered processor. When a store instruction is encountered in the instruction stream, the LATU compares the target address of the store instruction against the table of lock addresses. If the target address matches one of the lock addresses, indicating that the store instruction is the corresponding unlock instruction (or lock release instruction), a sync instruction is issued ahead of the store operation.Type: GrantFiled: December 7, 2004Date of Patent: November 18, 2008Assignee: International Business Machines CorporationInventors: Andrew Dunshea, Satya Prakash Sharma, Mysore Sathyanarayana Srinivas
-
Publication number: 20080189417Abstract: A method, system and computer program product for transitioning network traffic between logical partitions in one or more data processing systems are disclosed. The method includes defining a plurality of logical partitions with respect to one or more processing units of one or more data processing systems and dynamically reallocating resources from a second partition to a first partition among the plurality of logical partitions. Packets awaiting processing are transferred from the second partition to the first partition and processed on the first partition.Type: ApplicationFiled: March 28, 2008Publication date: August 7, 2008Inventors: Frank Dea, Rakesh Sharma, Satya Prakash Sharma, Vinit Jain
-
Patent number: 5655146Abstract: A coexecutor for executing functions offloaded from central processors (CPs) in a data processing system, as requested by one or more executing control programs, which include a host operating system (host OS), and subsystem programs and applications executing under the host OS. The offloaded functions are embodied in code modules. Code modules execute in the coexecutor in parallel with non-offloaded functions being executed by the CPs. Thus, the CPs do not need to execute functions which can be executed by the coexecutor. CP requests to the coexecutor specify the code modules which are accessed by the coexecutor from host shared storage under the same constraints and access limitations as the control programs. The coexecutor may emulate host dynamic address translation, and may use a provided host storage key in accessing host storage. The restricted access operating state for the coexecutor maintains data integrity.Type: GrantFiled: July 12, 1996Date of Patent: August 5, 1997Assignee: International Business Machines CorporationInventors: Richard Irwin Baum, Glen Alan Brent, Hatem Mohamed Ghafir, Balakrishna Raghavendra Iyer, Inderpal Singh Narang, Gururaj Seshagiri Rao, Casper Anthony Scalzi, Satya Prakash Sharma, Bhaskar Sinha, Lee Hardy Wilson