Patents by Inventor Usha Srinivasan

Usha Srinivasan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7877810
    Abstract: A system, method and client user interface for a copy protection service employs software agents masquerading as nodes in decentralized networks for monitoring and interdicting file sharing activities of protected files in the networks. A control center communicates with the software agents and subscriber client computers through user interfaces, so as to provide monitoring information to users of the client computers and control the monitoring and interdiction of protected files according to instructions received from the client computers. A one-click method for requesting protection of a file, providing the terms of such protection, and updating billing information for the user is implemented through the user interface to simplify user interaction with the copy protection service.
    Type: Grant
    Filed: February 28, 2005
    Date of Patent: January 25, 2011
    Assignee: Rovi Solutions Corporation
    Inventors: Todd Basche, Usha Srinivasan, James Patterson, Mitesh Pancholy
  • Publication number: 20090150581
    Abstract: A method for processing input/output request packets (IRPs) directed to Data Volumes having a meta-data extent and at least one data extent begins by initiating an IRP. The IRP is evaluated by a volume filter to determine a meta-data extent to handle the IRP. The IRP is directed by the volume filter to the appropriate meta-data extent. The IRP is redirected from the meta-data extent to at least one data extent associated with the meta-data extent.
    Type: Application
    Filed: November 12, 2003
    Publication date: June 11, 2009
    Inventors: David Chimitt, James Hunter, Joseph P. Neill, Linh D. Nguyen, Tri T. Phung, Usha Srinivasan
  • Publication number: 20060024703
    Abstract: The present invention relates to compositions and methods for the detection and characterization of nucleic acid sequences and variations in nucleic acid sequences present in multiple genomes. In particular, the present invention provides microarrays possessing two or more whole genomes and methods of making and using the same to detect the presence or absence of target sequences in the plurality of genomes.
    Type: Application
    Filed: June 1, 2005
    Publication date: February 2, 2006
    Applicant: The Regents of the University of Michigan
    Inventors: Lixin Zhang, Betsy Foxman, Carl Marrs, Janet Gilsdorf, Usha Srinivasan, Debashis Ghosh
  • Publication number: 20050198535
    Abstract: A system, method and client user interface for a copy protection service employs software agents masquerading as nodes in decentralized networks for monitoring and interdicting file sharing activities of protected files in the networks. A control center communicates with the software agents and subscriber client computers through user interfaces, so as to provide monitoring information to users of the client computers and control the monitoring and interdiction of protected files according to instructions received from the client computers. A one-click method for requesting protection of a file, providing the terms of such protection, and updating billing information for the user is implemented through the user interface to simplify user interaction with the copy protection service.
    Type: Application
    Filed: February 28, 2005
    Publication date: September 8, 2005
    Inventors: Todd Basche, Usha Srinivasan, James Patterson, Mitesh Pancholy
  • Publication number: 20050091167
    Abstract: An interdiction system includes software agents masquerading as nodes in a decentralized network, a query matcher that receives search results captured by the software agents and reports matches with protected files back to the software agents, and a central coordinating authority that coordinates activities of the software agents by sending instructions to the software agents specifying actions to be taken. Possible activities and related interdicting methods include manipulating search results before forwarding them on in the network, quarantining selected nodes in the network, performing file impersonations such as transferring synthesized decoys, performing file transfer attenuation, and hash spoofing.
    Type: Application
    Filed: March 18, 2004
    Publication date: April 28, 2005
    Applicant: MACROVISION CORPORATION
    Inventors: James Moore, William Bland, Scott Francis, Neil King, James Patterson, Usha Srinivasan, Paul Widden
  • Patent number: 5699505
    Abstract: A method is provided for collecting information located within a plurality of hardware elements of a computer system. The hardware elements of the plurality of hardware elements are simultaneously instructed to collect the information. The information within the instructed hardware elements is simultaneously collected. A maintenance system is provided for monitoring the computer system and determining a computer system error in accordance with the monitoring. The step of simultaneously instructing the hardware elements to collect the information is performed in accordance with a computer error determined in this manner. The hardware elements, which may be hardware processors, are provided with individual hardware modules which receive the simultaneous instructions to collect data and direct the simultaneous collection of information within the hardware elements. A transmission link is coupled to each hardware element in the computer system for transmitting the collected information.
    Type: Grant
    Filed: August 20, 1996
    Date of Patent: December 16, 1997
    Assignee: Unisys Corporation
    Inventor: Usha Srinivasan