Patents by Inventor Vivek Vaidya

Vivek Vaidya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11983286
    Abstract: Methods, systems, and devices for data processing are described. Some database systems may implement data processing permits to manage data access. A database system may use encryption schemes to tie permits to data (e.g., cryptographically ensuring that the system follows data regulations). To support queries for a database implementing such encryption schemes, the database may implement a proxy. When the system receives a query, the database proxy may intercept and transform the query based on the encryption schema of the database. The database proxy may execute the transformed query at the database, receive encrypted query results in response, and decrypt the results for use by the querying application. Additionally, the system may access relevant data processing permits to support querying operations. For example, the system may use permits when transforming the query, executing the query in the database, preparing query results for the querying application, or any combination thereof.
    Type: Grant
    Filed: April 13, 2020
    Date of Patent: May 14, 2024
    Assignee: Ketch Kloud, Inc.
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Patent number: 11870882
    Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
    Type: Grant
    Filed: June 4, 2021
    Date of Patent: January 9, 2024
    Assignee: Salesforce, Inc.
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Patent number: 11811907
    Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
    Type: Grant
    Filed: June 4, 2021
    Date of Patent: November 7, 2023
    Assignee: Ketch Kloud, Inc.
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Patent number: 11810301
    Abstract: A method for image segmentation includes receiving an input image. The method further includes obtaining a deep learning model having a triad of predictors. Furthermore, the method includes processing the input image by a shape model in the triad of predictors to generate a segmented shape image. Moreover, the method includes presenting the segmented shape image via a display unit.
    Type: Grant
    Filed: April 9, 2021
    Date of Patent: November 7, 2023
    Assignee: General Electric Company
    Inventors: Harihan Ravishankar, Vivek Vaidya, Sheshadri Thiruvenkadam, Rahul Venkataramani, Prasad Sudhakar
  • Publication number: 20230239134
    Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
    Type: Application
    Filed: March 29, 2023
    Publication date: July 27, 2023
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Patent number: 11328082
    Abstract: Methods, systems, and devices for data processing are described. Some database systems may support differential privacy for encrypted data. For example, a database may store user data as ciphertext. A system may receive a statistical query for the user data and may identify a relevant differential privacy mechanism. The system may transform the query to operate on encrypted data while including a noisification function based on the mechanism. The system may execute the transformed query at the database, involving adding noise to the query result according to the noisification function without decrypting the data. For example, the system may leverage homomorphic encryption techniques to inject the noise while the data remains encrypted. The database may return the noisified, encrypted query results, which the system may decrypt for statistical analysis. By applying differential privacy on the encrypted data, the system may avoid exposing any private user information throughout the process.
    Type: Grant
    Filed: April 13, 2020
    Date of Patent: May 10, 2022
    Assignee: Ketch Kloud, Inc.
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Patent number: 11232344
    Abstract: The present approach relates to feature ranking within deep neural networks in a multi-task and/or multi-label setting. Approaches are described to identify features that are task-specific as well as features that are shared across multiple tasks. In addition to facilitating interpretability, the selected subset of features can be used to make efficient models leading to better stability & regularization along with reduced compute and memory.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: January 25, 2022
    Assignee: General Electric Company
    Inventors: Hariharan Ravishankar, Bharath Ram Sundar, Prasad Sudhakar, Rahul Venkataramani, Vivek Vaidya
  • Patent number: 11169813
    Abstract: Methods, systems, and devices for data processing are described. In some systems, data pipelines may be implemented to handle data processing jobs. To improve data pipeline flexibility, the systems may use separate pipeline and policy declarations. For example, a pipeline server may receive both a pipeline definition defining a first set of data operations to perform and a policy definition including instructions for performing a second set of data operations, where the first set of data operations is a subset of the second set. The server may execute a data pipeline based on a trigger (e.g., a scheduled trigger, a received message, etc.). To execute the pipeline, the server may layer the policy definition into the pipeline definition when creating an execution plan. The server may execute the execution plan by performing a number of jobs using a set of resources and plugins according to the policy definition.
    Type: Grant
    Filed: July 30, 2019
    Date of Patent: November 9, 2021
    Assignee: Ketch Kloud, Inc.
    Inventors: Seth Yates, Yacov Salomon, Vivek Vaidya
  • Publication number: 20210319128
    Abstract: Methods, systems, and devices for data processing are described. Some database systems may implement data processing permits to manage data access. A database system may use encryption schemes to tie permits to data (e.g., cryptographically ensuring that the system follows data regulations). To support queries for a database implementing such encryption schemes, the database may implement a proxy. When the system receives a query, the database proxy may intercept and transform the query based on the encryption schema of the database. The database proxy may execute the transformed query at the database, receive encrypted query results in response, and decrypt the results for use by the querying application. Additionally, the system may access relevant data processing permits to support querying operations. For example, the system may use permits when transforming the query, executing the query in the database, preparing query results for the querying application, or any combination thereof.
    Type: Application
    Filed: April 13, 2020
    Publication date: October 14, 2021
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Publication number: 20210319131
    Abstract: Methods, systems, and devices for data processing are described. Some database systems may support differential privacy for encrypted data. For example, a database may store user data as ciphertext. A system may receive a statistical query for the user data and may identify a relevant differential privacy mechanism. The system may transform the query to operate on encrypted data while including a noisification function based on the mechanism. The system may execute the transformed query at the database, involving adding noise to the query result according to the noisification function without decrypting the data. For example, the system may leverage homomorphic encryption techniques to inject the noise while the data remains encrypted. The database may return the noisified, encrypted query results, which the system may decrypt for statistical analysis. By applying differential privacy on the encrypted data, the system may avoid exposing any private user information throughout the process.
    Type: Application
    Filed: April 13, 2020
    Publication date: October 14, 2021
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Publication number: 20210297236
    Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
    Type: Application
    Filed: June 4, 2021
    Publication date: September 23, 2021
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Publication number: 20210297237
    Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
    Type: Application
    Filed: June 4, 2021
    Publication date: September 23, 2021
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Publication number: 20210233244
    Abstract: A method for image segmentation includes receiving an input image. The method further includes obtaining a deep learning model having a triad of predictors. Furthermore, the method includes processing the input image by a shape model in the triad of predictors to generate a segmented shape image. Moreover, the method includes presenting the segmented shape image via a display unit.
    Type: Application
    Filed: April 9, 2021
    Publication date: July 29, 2021
    Inventors: Harihan Ravishankar, Vivek Vaidya, Sheshadri Thiruvenkadam, Rahul Venkataramani, Prasad Sudhakar
  • Patent number: 11032062
    Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: June 8, 2021
    Assignee: Switchbit, Inc.
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Publication number: 20210083843
    Abstract: Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
    Type: Application
    Filed: January 13, 2020
    Publication date: March 18, 2021
    Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
  • Publication number: 20210034372
    Abstract: Methods, systems, and devices for data processing are described. In some systems, data pipelines may be implemented to handle data processing jobs. To improve data pipeline flexibility, the systems may use separate pipeline and policy declarations. For example, a pipeline server may receive both a pipeline definition defining a first set of data operations to perform and a policy definition including instructions for performing a second set of data operations, where the first set of data operations is a subset of the second set. The server may execute a data pipeline based on a trigger (e.g., a scheduled trigger, a received message, etc.). To execute the pipeline, the server may layer the policy definition into the pipeline definition when creating an execution plan. The server may execute the execution plan by performing a number of jobs using a set of resources and plugins according to the policy definition.
    Type: Application
    Filed: July 30, 2019
    Publication date: February 4, 2021
    Inventors: Seth Yates, Yacov Salomon, Vivek Vaidya
  • Publication number: 20190130247
    Abstract: The present approach relates to feature ranking within deep neural networks in a multi-task and/or multi-label setting. Approaches are described to identify features that are task-specific as well as features that are shared across multiple tasks. In addition to facilitating interpretability, the selected subset of features can be used to make efficient models leading to better stability & regularization along with reduced compute and memory.
    Type: Application
    Filed: October 31, 2017
    Publication date: May 2, 2019
    Inventors: Hariharan Ravishankar, Bharath Ram Sundar, Prasad Sudhakar, Rahul Venkataramani, Vivek Vaidya
  • Publication number: 20180157800
    Abstract: Systems and methods are provided for user defined distributed learning models grouped based on user clusters for configuring settings of a medical diagnostic imaging system. The systems and methods are configured to maintain models with predetermined settings for at least one of system settings, image presentation settings, or anatomical structures. The systems and methods are configured to calculate a data value representing select user preferences for a first user, identifying a first cluster based on the data value, and assigning a first model from the models to the first user based on the first cluster. The systems and methods are configured to monitor use of the first model by the first user during a medical diagnostic application to determine whether the first model is updated by the first user or automatically during the medical diagnostic application by changing at least one of system settings, image presentation settings, or anatomical structures.
    Type: Application
    Filed: December 1, 2017
    Publication date: June 7, 2018
    Inventors: Hariharan Ravishankar, Vivek Vaidya, Christian Fritz Perrey
  • Publication number: 20160169996
    Abstract: The present application discloses a method of prescribing a scan plane during Magnetic Resonance Imaging (MRI) of an anatomy. The method comprises acquiring a volume image of the anatomy at a first resolution and simultaneously displaying three planar images representing cross-sections through the anatomy. The three images are orthogonal to each other and intersecting at a common point in the volume. The method also comprises further displaying a pair of axes on each image showing a correspondence of the image with each of the other two images, and receiving a manipulation of one at least one of the axes on at least one of the images and automatically updating the other images to maintain the correspondences. The method also comprises acquiring a volume of the anatomy at a second resolution that is higher than the first resolution.
    Type: Application
    Filed: December 16, 2014
    Publication date: June 16, 2016
    Inventors: Hirohito Okuda, Yoshihiro Oda, Osamu Takayama, Vivek Vaidya
  • Publication number: 20130090946
    Abstract: An imaging workflow system includes a workstation for acquiring patient information and requesting a patient scan. The request for a patient scan includes scan information for performing the scan. A registration module receives the scan information and the patient information. The registration module automatically schedules the patient scan based on the scan information and the patient information. The registration module determines an imaging protocol based on the patient information and the scan information. An imaging module within an imaging system receives the imaging protocol. The imaging module automatically sets scan parameters based on the imaging protocol. The imaging system scans the patient based on the scan parameters to acquire image data. A user interface controls the patient scan. The user interface includes a display to display images generated from the acquired image data.
    Type: Application
    Filed: October 5, 2011
    Publication date: April 11, 2013
    Inventors: Thomas Kwok-Fah Foo, Robert David Darrow, Kenji Suzuki, Sandeep Narendra Gupta, Rakesh Mullick, Vivek Vaidya, Xiaodong Tao, Ting Song