Patents by Inventor Vivek Vaidya
Vivek Vaidya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11983286Abstract: Methods, systems, and devices for data processing are described. Some database systems may implement data processing permits to manage data access. A database system may use encryption schemes to tie permits to data (e.g., cryptographically ensuring that the system follows data regulations). To support queries for a database implementing such encryption schemes, the database may implement a proxy. When the system receives a query, the database proxy may intercept and transform the query based on the encryption schema of the database. The database proxy may execute the transformed query at the database, receive encrypted query results in response, and decrypt the results for use by the querying application. Additionally, the system may access relevant data processing permits to support querying operations. For example, the system may use permits when transforming the query, executing the query in the database, preparing query results for the querying application, or any combination thereof.Type: GrantFiled: April 13, 2020Date of Patent: May 14, 2024Assignee: Ketch Kloud, Inc.Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Patent number: 11870882Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.Type: GrantFiled: June 4, 2021Date of Patent: January 9, 2024Assignee: Salesforce, Inc.Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Patent number: 11811907Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.Type: GrantFiled: June 4, 2021Date of Patent: November 7, 2023Assignee: Ketch Kloud, Inc.Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Patent number: 11810301Abstract: A method for image segmentation includes receiving an input image. The method further includes obtaining a deep learning model having a triad of predictors. Furthermore, the method includes processing the input image by a shape model in the triad of predictors to generate a segmented shape image. Moreover, the method includes presenting the segmented shape image via a display unit.Type: GrantFiled: April 9, 2021Date of Patent: November 7, 2023Assignee: General Electric CompanyInventors: Harihan Ravishankar, Vivek Vaidya, Sheshadri Thiruvenkadam, Rahul Venkataramani, Prasad Sudhakar
-
Publication number: 20230239134Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.Type: ApplicationFiled: March 29, 2023Publication date: July 27, 2023Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Patent number: 11328082Abstract: Methods, systems, and devices for data processing are described. Some database systems may support differential privacy for encrypted data. For example, a database may store user data as ciphertext. A system may receive a statistical query for the user data and may identify a relevant differential privacy mechanism. The system may transform the query to operate on encrypted data while including a noisification function based on the mechanism. The system may execute the transformed query at the database, involving adding noise to the query result according to the noisification function without decrypting the data. For example, the system may leverage homomorphic encryption techniques to inject the noise while the data remains encrypted. The database may return the noisified, encrypted query results, which the system may decrypt for statistical analysis. By applying differential privacy on the encrypted data, the system may avoid exposing any private user information throughout the process.Type: GrantFiled: April 13, 2020Date of Patent: May 10, 2022Assignee: Ketch Kloud, Inc.Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Patent number: 11232344Abstract: The present approach relates to feature ranking within deep neural networks in a multi-task and/or multi-label setting. Approaches are described to identify features that are task-specific as well as features that are shared across multiple tasks. In addition to facilitating interpretability, the selected subset of features can be used to make efficient models leading to better stability & regularization along with reduced compute and memory.Type: GrantFiled: October 31, 2017Date of Patent: January 25, 2022Assignee: General Electric CompanyInventors: Hariharan Ravishankar, Bharath Ram Sundar, Prasad Sudhakar, Rahul Venkataramani, Vivek Vaidya
-
Patent number: 11169813Abstract: Methods, systems, and devices for data processing are described. In some systems, data pipelines may be implemented to handle data processing jobs. To improve data pipeline flexibility, the systems may use separate pipeline and policy declarations. For example, a pipeline server may receive both a pipeline definition defining a first set of data operations to perform and a policy definition including instructions for performing a second set of data operations, where the first set of data operations is a subset of the second set. The server may execute a data pipeline based on a trigger (e.g., a scheduled trigger, a received message, etc.). To execute the pipeline, the server may layer the policy definition into the pipeline definition when creating an execution plan. The server may execute the execution plan by performing a number of jobs using a set of resources and plugins according to the policy definition.Type: GrantFiled: July 30, 2019Date of Patent: November 9, 2021Assignee: Ketch Kloud, Inc.Inventors: Seth Yates, Yacov Salomon, Vivek Vaidya
-
Publication number: 20210319128Abstract: Methods, systems, and devices for data processing are described. Some database systems may implement data processing permits to manage data access. A database system may use encryption schemes to tie permits to data (e.g., cryptographically ensuring that the system follows data regulations). To support queries for a database implementing such encryption schemes, the database may implement a proxy. When the system receives a query, the database proxy may intercept and transform the query based on the encryption schema of the database. The database proxy may execute the transformed query at the database, receive encrypted query results in response, and decrypt the results for use by the querying application. Additionally, the system may access relevant data processing permits to support querying operations. For example, the system may use permits when transforming the query, executing the query in the database, preparing query results for the querying application, or any combination thereof.Type: ApplicationFiled: April 13, 2020Publication date: October 14, 2021Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Publication number: 20210319131Abstract: Methods, systems, and devices for data processing are described. Some database systems may support differential privacy for encrypted data. For example, a database may store user data as ciphertext. A system may receive a statistical query for the user data and may identify a relevant differential privacy mechanism. The system may transform the query to operate on encrypted data while including a noisification function based on the mechanism. The system may execute the transformed query at the database, involving adding noise to the query result according to the noisification function without decrypting the data. For example, the system may leverage homomorphic encryption techniques to inject the noise while the data remains encrypted. The database may return the noisified, encrypted query results, which the system may decrypt for statistical analysis. By applying differential privacy on the encrypted data, the system may avoid exposing any private user information throughout the process.Type: ApplicationFiled: April 13, 2020Publication date: October 14, 2021Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Publication number: 20210297236Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.Type: ApplicationFiled: June 4, 2021Publication date: September 23, 2021Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Publication number: 20210297237Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.Type: ApplicationFiled: June 4, 2021Publication date: September 23, 2021Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Publication number: 20210233244Abstract: A method for image segmentation includes receiving an input image. The method further includes obtaining a deep learning model having a triad of predictors. Furthermore, the method includes processing the input image by a shape model in the triad of predictors to generate a segmented shape image. Moreover, the method includes presenting the segmented shape image via a display unit.Type: ApplicationFiled: April 9, 2021Publication date: July 29, 2021Inventors: Harihan Ravishankar, Vivek Vaidya, Sheshadri Thiruvenkadam, Rahul Venkataramani, Prasad Sudhakar
-
Patent number: 11032062Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.Type: GrantFiled: January 13, 2020Date of Patent: June 8, 2021Assignee: Switchbit, Inc.Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Publication number: 20210083843Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.Type: ApplicationFiled: January 13, 2020Publication date: March 18, 2021Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Publication number: 20210034372Abstract: Methods, systems, and devices for data processing are described. In some systems, data pipelines may be implemented to handle data processing jobs. To improve data pipeline flexibility, the systems may use separate pipeline and policy declarations. For example, a pipeline server may receive both a pipeline definition defining a first set of data operations to perform and a policy definition including instructions for performing a second set of data operations, where the first set of data operations is a subset of the second set. The server may execute a data pipeline based on a trigger (e.g., a scheduled trigger, a received message, etc.). To execute the pipeline, the server may layer the policy definition into the pipeline definition when creating an execution plan. The server may execute the execution plan by performing a number of jobs using a set of resources and plugins according to the policy definition.Type: ApplicationFiled: July 30, 2019Publication date: February 4, 2021Inventors: Seth Yates, Yacov Salomon, Vivek Vaidya
-
Publication number: 20190130247Abstract: The present approach relates to feature ranking within deep neural networks in a multi-task and/or multi-label setting. Approaches are described to identify features that are task-specific as well as features that are shared across multiple tasks. In addition to facilitating interpretability, the selected subset of features can be used to make efficient models leading to better stability & regularization along with reduced compute and memory.Type: ApplicationFiled: October 31, 2017Publication date: May 2, 2019Inventors: Hariharan Ravishankar, Bharath Ram Sundar, Prasad Sudhakar, Rahul Venkataramani, Vivek Vaidya
-
Publication number: 20180157800Abstract: Systems and methods are provided for user defined distributed learning models grouped based on user clusters for configuring settings of a medical diagnostic imaging system. The systems and methods are configured to maintain models with predetermined settings for at least one of system settings, image presentation settings, or anatomical structures. The systems and methods are configured to calculate a data value representing select user preferences for a first user, identifying a first cluster based on the data value, and assigning a first model from the models to the first user based on the first cluster. The systems and methods are configured to monitor use of the first model by the first user during a medical diagnostic application to determine whether the first model is updated by the first user or automatically during the medical diagnostic application by changing at least one of system settings, image presentation settings, or anatomical structures.Type: ApplicationFiled: December 1, 2017Publication date: June 7, 2018Inventors: Hariharan Ravishankar, Vivek Vaidya, Christian Fritz Perrey
-
Publication number: 20160169996Abstract: The present application discloses a method of prescribing a scan plane during Magnetic Resonance Imaging (MRI) of an anatomy. The method comprises acquiring a volume image of the anatomy at a first resolution and simultaneously displaying three planar images representing cross-sections through the anatomy. The three images are orthogonal to each other and intersecting at a common point in the volume. The method also comprises further displaying a pair of axes on each image showing a correspondence of the image with each of the other two images, and receiving a manipulation of one at least one of the axes on at least one of the images and automatically updating the other images to maintain the correspondences. The method also comprises acquiring a volume of the anatomy at a second resolution that is higher than the first resolution.Type: ApplicationFiled: December 16, 2014Publication date: June 16, 2016Inventors: Hirohito Okuda, Yoshihiro Oda, Osamu Takayama, Vivek Vaidya
-
Publication number: 20130090946Abstract: An imaging workflow system includes a workstation for acquiring patient information and requesting a patient scan. The request for a patient scan includes scan information for performing the scan. A registration module receives the scan information and the patient information. The registration module automatically schedules the patient scan based on the scan information and the patient information. The registration module determines an imaging protocol based on the patient information and the scan information. An imaging module within an imaging system receives the imaging protocol. The imaging module automatically sets scan parameters based on the imaging protocol. The imaging system scans the patient based on the scan parameters to acquire image data. A user interface controls the patient scan. The user interface includes a display to display images generated from the acquired image data.Type: ApplicationFiled: October 5, 2011Publication date: April 11, 2013Inventors: Thomas Kwok-Fah Foo, Robert David Darrow, Kenji Suzuki, Sandeep Narendra Gupta, Rakesh Mullick, Vivek Vaidya, Xiaodong Tao, Ting Song