Patents by Inventor Vivek Shankar

Vivek Shankar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11883156
    Abstract: A patient handling device includes a frame for supporting a patient, a controller, and two alert lights which are activated when a controller detects an alert situation, such as, but not limited to, a patient exiting from the patient handling device. The controller is in communication with the alert lights and operable to monitor an integrated bed exit system. The alert lights are positioned adjacent the foot end corners of the frame and are viewable by a user positioned anywhere within a 270 degree section of a circle defined at the center of the patient handling device. The alert lights include one or more Light Emitting Diodes (LEDs).
    Type: Grant
    Filed: July 3, 2019
    Date of Patent: January 30, 2024
    Assignee: Stryker Corporation
    Inventors: David Terrance Becker, Christopher John Hopper, Michael Joseph Hayes, Richard C. Mayoras, Jr., Vivek Shankar
  • Patent number: 11727133
    Abstract: Embodiments herein describe a pattern or syntax that can be used to convey or express the reason or purpose for a service provider to request user data in an identity federation. A service provider can request user data from the identity provider using an authentication process. If the authentication process is successful, the identity provider provides an authorization token to the service provider which it can use to retrieve the user data. The embodiments herein obtain user consent in the same authentication process used to provide the authorization token. In order to do so, the embodiments herein introduce a pattern or syntax that the service provider uses to convey the purpose for which it wants to use the user data to the identity provider.
    Type: Grant
    Filed: April 30, 2021
    Date of Patent: August 15, 2023
    Assignee: International Business Machines Corporation
    Inventors: Vivek Shankar, Jose Angel Rodriguez, Weide Victor Soon, Adrian Rinaldi Sasmita
  • Publication number: 20230254353
    Abstract: A data processing system implements establishing a connection with an online communication platform using a first application to facilitate communication with the computing devices of participants to the online communication session, determining that presentation content includes embedded content comprising at least one embedded content item available from at least one content server, and obtaining embedded content information from a source of the presentation content on the data processing system.
    Type: Application
    Filed: February 8, 2022
    Publication date: August 10, 2023
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Vivek SHANKAR, David Pierre CLAUX
  • Publication number: 20220350907
    Abstract: Embodiments herein describe a pattern or syntax that can be used to convey or express the reason or purpose for a service provider to request user data in an identity federation. A service provider can request user data from the identity provider using an authentication process. If the authentication process is successful, the identity provider provides an authorization token to the service provider which it can use to retrieve the user data. The embodiments herein obtain user consent in the same authentication process used to provide the authorization token. In order to do so, the embodiments herein introduce a pattern or syntax that the service provider uses to convey the purpose for which it wants to use the user data to the identity provider.
    Type: Application
    Filed: April 30, 2021
    Publication date: November 3, 2022
    Inventors: Vivek SHANKAR, Jose Angel RODRIGUEZ, Weide Victor SOON, Adrian Rinaldi SASMITA
  • Patent number: 10791966
    Abstract: A patient handling device includes a deck for supporting a patient support surface, a controller, and two light sources, which are operable to output light of different colors. The controller is in communication with the light sources and operable to monitor the plurality of conditions and to generate a first unified indication by illuminating one of the lights when all the conditions remain in their desired state, and to generate a second indication by illuminating the other light when any of the conditions change from their desired state.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: October 6, 2020
    Assignee: Stryker Corporation
    Inventors: David Terrance Becker, Christopher John Hopper, Michael Joseph Hayes, Vivek Shankar, Richard C. Mayoras, Jr.
  • Publication number: 20190320943
    Abstract: A patient handling device includes a frame for supporting a patient, a controller, and two alert lights which are activated when a controller detects an alert situation, such as, but not limited to, a patient exiting from the patient handling device. The controller is in communication with the alert lights and operable to monitor an integrated bed exit system. The alert lights are positioned adjacent the foot end corners of the frame and are viewable by a user positioned anywhere within a 270 degree section of a circle defined at the center of the patient handling device. The alert lights include one or more Light Emitting Diodes (LEDs).
    Type: Application
    Filed: July 3, 2019
    Publication date: October 24, 2019
    Inventors: David Terrance Becker, Christopher John Hopper, Michael Joseph Hayes, Richard C. Mayoras, JR., Vivek Shankar
  • Patent number: 10320776
    Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: June 11, 2019
    Assignee: International Business Machines Corporation
    Inventors: Codur S. Pranam, Vivek Shankar
  • Patent number: 10171455
    Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Codur S. Pranam, Vivek Shankar
  • Patent number: 10003959
    Abstract: Systems and methods for the subscriber identity module (SIM) access profile (SAP) over Bluetooth. In one embodiment, intermediate responses from a SIM card containing procedure bytes are not transmitted to the client, but rather the appropriate response is generated by the server and sent to the SIM card. In another embodiment, the client groups together multiple command APDUs (Application Protocol Data Unit) into one message before sending out to the server, and the message may also contain parameters indicating various actions to be taken by the server in case an error is generated. In another embodiment, the client instructs the server to perform poling of the SIM card in an autonomous manner for any proactive data. Embodiments are not limited to a SIM card, and are applicable to other types of smart cards, such as an UICC (Universal Integrated Circuit Card).
    Type: Grant
    Filed: July 30, 2015
    Date of Patent: June 19, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Michele Berionne, Vivek Shankar, Karthik Sekuru
  • Patent number: 9998455
    Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Codur S. Pranam, Vivek Shankar
  • Publication number: 20180145965
    Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.
    Type: Application
    Filed: February 8, 2018
    Publication date: May 24, 2018
    Inventors: Codur S. Pranam, Vivek Shankar
  • Publication number: 20180145966
    Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.
    Type: Application
    Filed: February 8, 2018
    Publication date: May 24, 2018
    Inventors: Codur S. Pranam, Vivek Shankar
  • Patent number: 9917823
    Abstract: In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least, a determination that a PIM server cannot be accessed. A processor receives a request to access the PIM credential by a user. A processor receives validation of the request to access the PIM credential and an identity of the user. A processor retrieves the PIM credential from a database, wherein the database stores a plurality of PIM credentials owned by a system owner.
    Type: Grant
    Filed: October 1, 2015
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Kelvin K. V. Chin, Chee Meng Low, Vivek Shankar, Edwin B. Soenaryo
  • Patent number: 9887990
    Abstract: A computer-implemented method, computer program product, and system for tagging and replacing tagged credentials with target credentials unknown to a client. The method includes; receiving an access request from a client to access a protected resource on a target server, injecting credential field tags into a credential form used to access the protected resource, auto-submitting the credential form on the client computer, replace tagged credentials with target credentials, submitting the target credentials to the target server, and updating the target credentials if the target credentials are invalid or expired without intervention by the client.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Codur S. Pranam, Vivek Shankar
  • Publication number: 20170318009
    Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.
    Type: Application
    Filed: July 25, 2017
    Publication date: November 2, 2017
    Inventors: Codur S. Pranam, Vivek Shankar
  • Publication number: 20170310659
    Abstract: A computer-implemented method, computer program product, and system for tagging and replacing tagged credentials with target credentials unknown to a client. The method includes; receiving an access request from a client to access a protected resource on a target server, injecting credential field tags into a credential form used to access the protected resource, auto-submitting the credential form on the client computer, replace tagged credentials with target credentials, submitting the target credentials to the target server, and updating the target credentials if the target credentials are invalid or expired without intervention by the client.
    Type: Application
    Filed: April 25, 2016
    Publication date: October 26, 2017
    Inventors: Codur S. Pranam, Vivek Shankar
  • Patent number: 9628483
    Abstract: In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least, a determination that a PIM server cannot be accessed. A processor receives a request to access the PIM credential by a user. A processor receives validation of the request to access the PIM credential and an identity of the user. A processor retrieves the PIM credential from a database, wherein the database stores a plurality of PIM credentials owned by a system owner.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: April 18, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kelvin K. V. Chin, Chee Meng Low, Vivek Shankar, Edwin B. Soenaryo
  • Publication number: 20170099290
    Abstract: In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least, a determination that a PIM server cannot be accessed. A processor receives a request to access the PIM credential by a user. A processor receives validation of the request to access the PIM credential and an identity of the user. A processor retrieves the PIM credential from a database, wherein the database stores a plurality of PIM credentials owned by a system owner.
    Type: Application
    Filed: October 26, 2016
    Publication date: April 6, 2017
    Inventors: Kelvin K.V. Chin, Chee Meng Low, Vivek Shankar, Edwin B. Soenaryo
  • Publication number: 20170099275
    Abstract: In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least, a determination that a PIM server cannot be accessed. A processor receives a request to access the PIM credential by a user. A processor receives validation of the request to access the PIM credential and an identity of the user. A processor retrieves the PIM credential from a database, wherein the database stores a plurality of PIM credentials owned by a system owner.
    Type: Application
    Filed: October 1, 2015
    Publication date: April 6, 2017
    Inventors: Kelvin K. V. Chin, Chee Meng Low, Vivek Shankar, Edwin B. Soenaryo
  • Publication number: 20170034691
    Abstract: Systems and methods for the subscriber identity module (SIM) access profile (SAP) over Bluetooth. In one embodiment, intermediate responses from a SIM card containing procedure bytes are not transmitted to the client, but rather the appropriate response is generated by the server and sent to the SIM card. In another embodiment, the client groups together multiple command APDUs (Application Protocol Data Unit) into one message before sending out to the server, and the message may also contain parameters indicating various actions to be taken by the server in case an error is generated. In another embodiment, the client instructs the server to perform poling of the SIM card in an autonomous manner for any proactive data. Embodiments are not limited to a SIM card, and are applicable to other types of smart cards, such as an UICC (Universal Integrated Circuit Card).
    Type: Application
    Filed: July 30, 2015
    Publication date: February 2, 2017
    Inventors: Michele BERIONNE, Vivek SHANKAR, Karthik SEKURU