Patents by Inventor Abhinav Gupta
Abhinav Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10599538Abstract: A server may receive a device profile from a computing device. The device profile may identify a usage of at least software applications associated with the computing device. The server may perform a comparison of the device profile with other device profiles associated with other computing devices, determine a similarity index of the device profile with individual ones of the other device profiles, and select a subset of the other device profiles based on the similarity index to create a set of similar device profiles. The server may determine configuration differences between the device profile of the computing device and individual device profiles of the similar device profiles, determine recommendations based on the configuration differences, and send the recommendations to the computing device. Implementing one or more of the recommendations may cause the one or more tasks to execute faster or use less of one or more computing resources.Type: GrantFiled: May 31, 2018Date of Patent: March 24, 2020Assignee: Dell Products L.P.Inventors: Nikhil M. Vichare, Abhinav Gupta, Arturo Ramos
-
Publication number: 20200051146Abstract: According to the invention, a method for initiating a similar transaction to one previously initiated by a user is disclosed. The method may include sending a digital receipt for a first transaction to a user. The method may also include determining reminder information, where the reminder information indicates a future time or frequency. The method may further include sending to the user, upon occurrence of the future time or frequency, a digital reminder which includes an interactive element. The method may additionally include receiving an indication that the user has interacted with the interactive element, and initiating a second transaction having a characteristic in common with the first transaction based on the indication.Type: ApplicationFiled: October 17, 2019Publication date: February 13, 2020Applicant: The Western Union CompanyInventor: Abhinav Gupta
-
Publication number: 20200026877Abstract: In some examples, a computing device may determine that an event occurred and determine event data associated with the event. A first machine learning classifier may be used to determine that the event data includes personally identifiable information (PII) and a second machine learning classifier may be used to remove the PII from the event data to create modified event data. The PII may include one or more of a username, a password, at least a portion of a legal name, a password, at least a portion of an address, at least a portion of a social security number, or at least a portion of an account number associated with a financial institution. The modified event data may be stored in a device data file that includes data associated with the computing device. In some cases, the computing device may send the device data file to a server.Type: ApplicationFiled: July 17, 2018Publication date: January 23, 2020Inventors: Maheshwar Dattatri, Abhinav Gupta
-
Publication number: 20200019393Abstract: In some examples, a server may determine a plurality of variables associated with a software package. For example, the plurality of variables may include a size of the software package, a reboot variable associated with the software package indicating whether a reboot is to be performed after installing the software package, and an installation type indicating whether the software package is a first install or an upgrade. The server may execute a machine learning model to determine, based on the plurality of variables, a risk score predicting an installation success rate of the software package. The server may select a deployment strategy from a plurality of deployment strategies based at least in part on the risk score and the plurality of variables. The server may provide the software package to a plurality of computing devices in accordance with the deployment strategy.Type: ApplicationFiled: July 16, 2018Publication date: January 16, 2020Inventors: Nikhil M. Vichare, Arturo Ramos, JR., Abhinav Gupta
-
Publication number: 20190394291Abstract: In an embodiment, a method of payload matching via a single pass transformation of an HTTP payload includes receiving a payload packet destined for a recipient and parsing the payload packet in a single scan of the packet using a combined regular expression. The combined regular expression includes a plurality of regular expressions that correspond to a set of replacement rules.Type: ApplicationFiled: January 31, 2019Publication date: December 26, 2019Inventors: Chandra Sekhar Kondamuri, Neelima Balakrishnan, Abhinav Gupta, Lingyan Huang, Narendra Kumar Vyas Pentakota, Abhijeet Joglekar
-
Publication number: 20190391898Abstract: In some examples, a server may receive, from a computing device, a device profile identifying a gaming application and metrics associated with execution of a gaming application. The server may compare the device profile with other device profiles associated with other computing devices, determine a similarity index of the device profile with the other device profiles, and select a subset of the other device profiles based at least in part on the similarity index. The server may determine configuration differences between the device profile of the computing device and individual device profiles of the subset of the other device profiles and send the configuration recommendations to the computing device. The recommendations may include at least one of (1) modifying settings of an operating system of the computing device, (2) modifying settings of the gaming application, (3) changing a hardware component or peripheral device associated with the computing device.Type: ApplicationFiled: June 25, 2018Publication date: December 26, 2019Inventors: Nikhil M. Vichare, Abhinav Gupta, Nikul Anil Ingley
-
Publication number: 20190370139Abstract: A server may receive a device profile from a computing device. The device profile may identify a usage of at least software applications associated with the computing device. The server may perform a comparison of the device profile with other device profiles associated with other computing devices, determine a similarity index of the device profile with individual ones of the other device profiles, and select a subset of the other device profiles based on the similarity index to create a set of similar device profiles. The server may determine configuration differences between the device profile of the computing device and individual device profiles of the similar device profiles, determine recommendations based on the configuration differences, and send the recommendations to the computing device. Implementing one or more of the recommendations may cause the one or more tasks to execute faster or use less of one or more computing resources.Type: ApplicationFiled: May 31, 2018Publication date: December 5, 2019Inventors: Nikhil M. Vichare, Abhinav Gupta, Arturo Ramos
-
Patent number: 10489834Abstract: According to the invention, a method for initiating a similar transaction to one previously initiated by a user is disclosed. The method may include sending a digital receipt for a first transaction to a user. The method may also include determining reminder information, where the reminder information indicates a future time or frequency. The method may further include sending to the user, upon occurrence of the future time or frequency, a digital reminder which includes an interactive element. The method may additionally include receiving an indication that the user has interacted with the interactive element, and initiating a second transaction having a characteristic in common with the first transaction based on the indication.Type: GrantFiled: August 30, 2016Date of Patent: November 26, 2019Assignee: The Western Union CompanyInventor: Abhinav Gupta
-
Publication number: 20190334925Abstract: A content request communication, e.g., generated using a first processor of a device, can be transmitted to a web server. A response communication including content identifying a first value can be received from the web server. The first processor can facilitate presentation of the content on a first display of the device. A communication can be received at a second processor of the device from a remote server. The communication can include data representing a second value and can be generated at the remote server using information received from the web server. Further, the second processor can produce a secure verification output that can be presented on a separate, second display, representing at least the second value. The presentation on first display can at least partially overlap in time with the presentation on the second display.Type: ApplicationFiled: July 11, 2019Publication date: October 31, 2019Applicant: Apple Inc.Inventors: Gianpaolo Fasoli, Matthew C. Byington, Christopher Sharp, Anton K. Diederich, Nicholas J. Shearer, Roberto G. Yepez, Petr Kostka, Gianluca Barbieri, Abhinav Gupta
-
Publication number: 20190274042Abstract: A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“URL”) to the mobile device, and detecting an access of the unique URL by the mobile device through a first communication path. In response to detecting the access of the unique URL, requesting and subsequently receiving, by the host system in real-time, a phone number and a subscriber identification ID associated with the mobile device through a second communication path distinct from the first communication path, and a device fingerprint of the mobile device through the first communication path. The method further includes initiating a risk analysis based on the phone number, the subscriber ID, and the device fingerprint and determining an authentication status of the mobile device based on the risk analysis.Type: ApplicationFiled: May 17, 2019Publication date: September 5, 2019Applicant: The Western Union CompanyInventors: Abhinav Gupta, Bernard McManus, Don McNelley
-
Patent number: 10389733Abstract: A content request communication, e.g., generated using a first processor of a device, can be transmitted to a web server. A response communication including content identifying a first value can be received from the web server. The first processor can facilitate presentation of the content on a first display of the device. A communication can be received at a second processor of the device from a remote server. The communication can include data representing a second value and can be generated at the remote server using information received from the web server. Further, the second processor can produce a secure verification output that can be presented on a separate, second display, representing at least the second value. The presentation on first display can at least partially overlap in time with the presentation on the second display.Type: GrantFiled: September 6, 2016Date of Patent: August 20, 2019Assignee: Apple Inc.Inventors: Gianpaolo Fasoli, Matthew C. Byington, Christopher Sharp, Anton K. Diederich, Nicholas J. Shearer, Roberto G. Yepez, Petr Kostka, Gianluca Barbieri, Abhinav Gupta
-
Publication number: 20190196698Abstract: Systems and techniques are described herein for directing a user conversation to obtain an editing query, and removing and replacing objects in an image based on the editing query. Pixels corresponding to an object in the image indicated by the editing query are ascertained. The editing query is processed to determine whether it includes a remove request or a replace request. A search query is constructed to obtain images, such as from a database of stock images, including fill material or replacement material to fulfill the remove request or replace request, respectively. Composite images are generated from the fill material or the replacement material and the image to be edited. Composite images are harmonized to remove editing artifacts and make the images look natural. A user interface exposes images, and the user interface accepts multi-modal user input during the directed user conversation.Type: ApplicationFiled: December 22, 2017Publication date: June 27, 2019Applicant: Adobe Inc.Inventors: Scott David Cohen, Brian Lynn Price, Abhinav Gupta
-
Patent number: 10327141Abstract: A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“URL”) to the mobile device, and detecting an access of the unique URL by the mobile device through a first communication path. In response to detecting the access of the unique URL, requesting and subsequently receiving, by the host system in real-time, a phone number and a subscriber identification ID associated with the mobile device through a second communication path distinct from the first communication path, and a device fingerprint of the mobile device through the first communication path. The method further includes initiating a risk analysis based on the phone number, the subscriber ID, and the device fingerprint and determining an authentication status of the mobile device based on the risk analysis.Type: GrantFiled: November 20, 2017Date of Patent: June 18, 2019Assignee: The Western Union CompanyInventors: Abhinav Gupta, Bernard McManus, Don McNelley
-
Publication number: 20190141703Abstract: Methods, systems, and devices for wireless communications are described for mapping demodulation reference signal (DMRS) data to resource elements (REs) within a shortened transmission time interval (sTTI) so as to avoid collision with other reference signal data that the sTTI may be configured to include, such as channel state information reference signal (CSI-RS) data, cell-specific reference signal (CRS) data, or the like. A base station may select a DMRS mapping pattern for an sTTI based on one or more factors, including a CSI-RS configuration, a CRS configuration of the sTTI, an antenna port configuration for CRS (e.g., a number of CRS ports and associated number of layers configured for CRS, such as a one port CRS having a two-layer configuration, or a two port CRS having a four-layer configuration), or a type of subframe that includes the sTTI.Type: ApplicationFiled: October 31, 2018Publication date: May 9, 2019Inventors: Abhinav Gupta, Seyedkianoush Hosseini, Amir Farajidana
-
Patent number: 10244416Abstract: Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.Type: GrantFiled: June 14, 2017Date of Patent: March 26, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Arunkumar Navasivasakthivelsamy, Mitesh K. Desai, Dattatraya B. Rajpure, Henrique M. A. Filgueiras, Mukund Sankaranarayan, Abhinav Gupta, Arvind M. Murching, Manoj Kumar Miryala
-
Publication number: 20190087653Abstract: Preserving ink effects in ink-to-text are described. A method of preserving styles and ink effects in ink-to-text can include receiving ink strokes, each ink stroke having associated ink parameters; receiving a command to convert one or more ink strokes to text; identifying text comprising characters and words from the one or more ink strokes; generating an appropriate coloring or style for each character or word based on the ink parameters associated with corresponding ink strokes, the appropriate coloring or style being generated based on a mapping between ink parameters and text parameters; and applying the appropriate coloring or style to the text.Type: ApplicationFiled: January 15, 2018Publication date: March 21, 2019Inventors: Ana Ruth Resendez Rodriguez, Abhinav Gupta, Gilles Louis Peron, Carine Ramses Iskander, Justin Leigh Schnarr, William Joseph Devereux, Ian Mikutel
-
Publication number: 20180253721Abstract: A method for coordinating data with a mobile wallet application on a mobile device is provided. The method may include receiving an instruction to add a digital card to a digital wallet, where the instruction includes an identifier of a transaction between a sending entity and a receiving entity facilitated by an intermediate entity. The method may also include receiving from the intermediate entity, status information associated with the digital card, which includes information associated with the transaction. The method may further include providing at least a portion of the status information to a secondary application. The method may additionally include receiving a selection of the digital card. The method may moreover include causing a tertiary application to execute based at least in part on the selection. The method may furthermore include sending to the tertiary application the identifier or at least some portion of the status information.Type: ApplicationFiled: March 3, 2017Publication date: September 6, 2018Applicant: The Western Union CompanyInventor: Abhinav Gupta
-
Patent number: 10007927Abstract: A behavioral targeting system determines user profiles from online activity. The system includes a plurality of models that define parameters for determining a user profile score. Event information, which comprises on-line activity of the user, is received at an entity. To generate a user profile score, a model is selected. The model comprises recency, intensity and frequency dimension parameters. The behavioral targeting system generates a user profile score for a target objective, such as brand advertising or direct response advertising. The parameters from the model are applied to generate the user profile score in a category. The behavioral targeting system has application for use in ad serving to on-line users.Type: GrantFiled: February 29, 2016Date of Patent: June 26, 2018Assignee: EXCALIBUR IP, LLCInventors: Joshua M. Koran, Christina Yip Chung, Abhinav Gupta, George H John, Hongfeng Yin, Long-ji Lin, Richard Frankel
-
Publication number: 20180160306Abstract: A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“URL”) to the mobile device, and detecting an access of the unique URL by the mobile device through a first communication path. In response to detecting the access of the unique URL, requesting and subsequently receiving, by the host system in real-time, a phone number and a subscriber identification ID associated with the mobile device through a second communication path distinct from the first communication path, and a device fingerprint of the mobile device through the first communication path. The method further includes initiating a risk analysis based on the phone number, the subscriber ID, and the device fingerprint and determining an authentication status of the mobile device based on the risk analysis.Type: ApplicationFiled: November 20, 2017Publication date: June 7, 2018Applicant: The Western Union CompanyInventors: Abhinav Gupta, Bernard McManus, Don McNelley
-
Publication number: 20180132120Abstract: Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.Type: ApplicationFiled: June 14, 2017Publication date: May 10, 2018Inventors: Arunkumar Navasivasakthivelsamy, Mitesh K. Desai, Dattatraya B. Rajpure, Henrique M.A. Filgueiras, Mukund Sankaranarayan, Abhinav Gupta, Arvind M. Murching, Manoj Kumar Miryala