Patents by Inventor Abhishek Jain

Abhishek Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200222329
    Abstract: An abuse deterrent oral solid dosage form comprising: an inner portion comprising a drug susceptible to abuse and a pH dependent polymer soluble in acidic medium an outer portion, wherein the portion is devoid of drug susceptible to abuse and comprises an immediate release form of alkalizer and a sustained release form of alkalizer, the sustained release form of alkalizer comprising an alkalizer and a rate controlling excipient.
    Type: Application
    Filed: June 22, 2018
    Publication date: July 16, 2020
    Applicant: SUN PHARMA ADVANCED RESEARCH COMPANY LIMITED
    Inventors: Nitin DHARMADHIKARI, Yashoraj ZALA, Abhishek JAIN, Bramhanand HANAMANNAVAR, Umesh PAI
  • Publication number: 20200218464
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving one or more suggestions which correspond to placement of data in storage, where the one or more suggestions are based on data workload characteristics. The one or more suggestions are used to identify portions of actual data stored in actual storage which correspond to the one or more suggestions. For each of the identified portions of the actual data stored in the first tier, the one or more suggestions is further used to determine whether to transfer the given identified portion of the actual data to the second tier. Moreover, in response to determining to transfer at least one of the identified portions of the actual data to the second tier, one or more instructions are sent to transfer the at least one of the identified portions of the actual data from the first tier to the second tier.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 9, 2020
    Inventors: Sandeep R. Patil, Sasikanth Eda, Abhishek Jain, Digvijay Ukirde
  • Patent number: 10694435
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving, by the computer, information. The information that is received includes: an expiry time which corresponds to a communication request, and communication resources associated with the communication request. The communication resources further include a channel and/or a spectrum band which correspond to the communication request. The expiry time is packaged with the communication resources by the computer. Furthermore, the packaged expiry time and communication resources is passed, by the computer, to devices which correspond to each of one or more identities associated with the communication request. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gandhi Sivakumar, Rajan Dilavar Mithani, Sandeep R. Patil, Sasikanth Eda, Abhishek Jain
  • Publication number: 20200193238
    Abstract: A computer-implemented method according to one embodiment includes classifying an image stored on a device as a type of image. A user's access pattern of other images also classified as the type of image is analyzed. The method further includes analyzing at least one sharing medium that the user has previously used to share the image and/or other images. The analyzing the at least one medium is at least in part based on the classified type of the image. A previously recorded delete pattern of the user is analyzed. The analyzing the previously recorded delete pattern of the user is at least in part based on the classified type of the image. Based on the classified type of the image and/or based on results of the analyses, the image is categorized to one of a plurality of image compression categories. Each category corresponds to a degree of image compression.
    Type: Application
    Filed: December 12, 2018
    Publication date: June 18, 2020
    Inventors: Deepak Ghuge, Abhishek Jain, Subhojit Roy, Sasikanth Eda, Manojkiran Eda
  • Patent number: 10644700
    Abstract: A latch is provided. The latch includes a plurality of storage nodes including a plurality of data storage nodes configured to store a data bit having one of two states and a plurality of complementary data storage nodes configured to store a complement of the data bit. The latch includes a plurality of supply voltage multi-dependency stages respectively corresponding to the plurality of storage nodes. Each supply voltage multi-dependency stage has an output coupled to a storage node and at least two control inputs respectively coupled to at least two other storage nodes of the plurality of storage nodes. The supply voltage multi-dependency stage is configured to cause a state of the data bit stored in the storage node to change from a first state to a second state in response a change in both states of two data bits respectively stored in the at least two other storage nodes.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: May 5, 2020
    Assignees: STMICROELECTRONICS INTERNATIONAL N.V., STMICROELECTRONICS S.R.L.
    Inventors: Andrea Mario Veggetti, Abhishek Jain
  • Publication number: 20200133554
    Abstract: Provided are a computer program product, system, and method for determining a storage pool in which to store a data object. Event messages are received. Each event message includes metadata on an object updated in a storage pool of a plurality of storage pools, at least two of the storage pools have different reliability ratings. The event messages are added to a message queue. A determination is made of a data classification of a changed data object indicated in an event message in the message queue. The changed data object is moved to a storage pool having a reliability rating satisfying a reliability rating associated with the data classification of the changed data object.
    Type: Application
    Filed: October 29, 2018
    Publication date: April 30, 2020
    Inventors: Gregory T. Kishi, Joseph W. Dain, Nilesh P. Bhosale, Abhishek Jain, Sandeep R. Patil
  • Publication number: 20200134062
    Abstract: Provided are a computer program product, system, and method for determining a storage pool in which to store a data object. Event messages are received. Each event message includes metadata on an object updated in a storage pool of a plurality of storage pools, at least two of the storage pools have different reliability ratings. The event messages are added to a message queue. Information is added to a database for the event messages in the message queue including the metadata in the event message. A determination is made of a data classification of a changed data object indicated in the database. The changed data object indicated in the database having the determined data classification is moved to a storage pool having a reliability rating satisfying a reliability rating associated with the data classification of the changed data object.
    Type: Application
    Filed: October 29, 2018
    Publication date: April 30, 2020
    Inventors: Gregory T. Kishi, Joseph W. Dain, Nilesh P. Bhosale, Abhishek Jain, Sandeep R. Patil
  • Publication number: 20200089782
    Abstract: A computer-implemented method, according to one embodiment, includes: capturing a snapshot of data stored at a primary storage location, and determining a transaction identification which corresponds to each file operation included in the snapshot, where each file operation includes a respective number of sub-operations. Data included in the snapshot which corresponds to completed ones of the sub-operations is identified, and the determined transaction identifications as well as the identified data is used to populate entries in a data structure. The snapshot is sent to a secondary storage location, and an acknowledgement is received from the secondary storage location for each of the completed sub-operations that are successfully performed at the secondary storage location. Furthermore, the data structure is updated based on the received acknowledgements.
    Type: Application
    Filed: September 13, 2018
    Publication date: March 19, 2020
    Inventors: Abhishek Jain, Abhishek S. Dave, Sasikanth Eda, Anil L. Palled
  • Publication number: 20200074091
    Abstract: Methods that can provide multi-layered data security in mobile personal computing devices are provided. One method includes assigning, by a processor, one of a plurality of security levels to applications of a mobile personal computing device, assigning one of the plurality of security levels to storage partitions of a storage device of the mobile personal computing device, and providing the applications access to data stored on the storage partitions based on a nexus of a first assigned security level for each application and a second assigned security level for each storage partition. Systems and apparatus that can include, perform, and/or implement the methods are also provided.
    Type: Application
    Filed: September 4, 2018
    Publication date: March 5, 2020
    Inventors: Abhishek Jain, Aakanksha Mathur, Sasikanth Eda, Sandeep Ramesh Patil
  • Patent number: 10576016
    Abstract: Embodiments for managing photographic capture by one or more processors are described. An image is received. The image includes at least one individual and is associated with a location. A signal indicative of a recommendation with respect to a posture of the at least one individual in the image is generated based on information associated with the at least one individual, the location, or a combination thereof.
    Type: Grant
    Filed: November 29, 2017
    Date of Patent: March 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sasikanth Eda, Deepak Ghuge, Abhishek Jain, Sandeep Patil
  • Publication number: 20200050769
    Abstract: A computer-implemented method according to one embodiment includes determining a classification associated with an instance of data, determining a vulnerability level of a first storage system at which the instance of data is currently located, and conditionally migrating the instance of data from the first storage system to a second storage system, based on the classification associated with the instance of data and the vulnerability level of the first storage system.
    Type: Application
    Filed: August 13, 2018
    Publication date: February 13, 2020
    Inventors: Nilesh P. Bhosale, Abhishek Jain, Sandeep R. Patil, Ashish Chaurasia
  • Publication number: 20200026873
    Abstract: Methods and systems for encrypting data for a multi-tenant filesystem environment are provided. A system for encrypting data for a multitenant filesystem environment includes a file characteristics module that determines file characteristics for a file. The system also includes a user identification module that collects user identification information for one or more file operations, where a file operation in the one or more file operations is performed on a portion of the file. The system further includes a portion information module that gathers portion information about the portion of the file. Additionally, the system includes an encryption module that associates the portion information with a subtenancy encryption key in one or more subtenancy encryption keys based on the user identification information, where the one or more subtenancy encryption keys are associated with the file.
    Type: Application
    Filed: July 20, 2018
    Publication date: January 23, 2020
    Inventors: Abhishek Jain, Anil Laxman Palled, Deepak Ghuge, Sasikanth Eda
  • Patent number: 10534559
    Abstract: A data storage system includes multiple tiers of data storage accessible by multiple hosts. The multiple tiers include an upper tier having a lower access latency and a lower tier having a higher access latency. For each extent among a plurality of extents of file system objects in the data storage, the storage controller separately tracks, for each of one or more hosts that access the extent, a respective heat indicative of a frequency of access by that host. In response to an event disassociating a first host among the multiple hosts from a particular extent among the plurality of extents, the storage controller recalculates an overall heat of the particular extent while excluding a first heat of the first host for the particular extent. The storage controller migrates extents among the multiple tiers based on overall heats of the plurality of extents.
    Type: Grant
    Filed: February 14, 2018
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Abhishek Jain, Sarvesh Patel, Subhojit Roy, Kushal Patel
  • Publication number: 20200007129
    Abstract: A latch is provided. The latch includes a plurality of storage nodes including a plurality of data storage nodes configured to store a data bit having one of two states and a plurality of complementary data storage nodes configured to store a complement of the data bit. The latch includes a plurality of supply voltage multi-dependency stages respectively corresponding to the plurality of storage nodes. Each supply voltage multi-dependency stage has an output coupled to a storage node and at least two control inputs respectively coupled to at least two other storage nodes of the plurality of storage nodes. The supply voltage multi-dependency stage is configured to cause a state of the data bit stored in the storage node to change from a first state to a second state in response a change in both states of two data bits respectively stored in the at least two other storage nodes.
    Type: Application
    Filed: June 25, 2019
    Publication date: January 2, 2020
    Inventors: Andrea Mario Veggetti, Abhishek Jain
  • Publication number: 20190394689
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving, by the computer, information. The information that is received includes: an expiry time which corresponds to a communication request, and communication resources associated with the communication request. The communication resources further include a channel and/or a spectrum band which correspond to the communication request. The expiry time is packaged with the communication resources by the computer. Furthermore, the packaged expiry time and communication resources is passed, by the computer, to devices which correspond to each of one or more identities associated with the communication request. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Application
    Filed: March 14, 2019
    Publication date: December 26, 2019
    Inventors: Gandhi Sivakumar, Rajan Dilavar Mithani, Sandeep R. Patil, Sasikanth Eda, Abhishek Jain
  • Publication number: 20190360994
    Abstract: Systems and methods for measuring dynamic hydraulic conductivity and permeability associated with a cell layer are disclosed. Some systems include a microfluidic device, one or more working-fluid reservoirs, and one or more fluid-resistance element. The microfluidic device includes a first microchannel, a second microchannel, and a barrier therebetween. The barrier includes a cell layer adhered thereto. The working fluids are delivered to the microfluidic device. The fluid-resistance elements are coupled to one or more of the fluid paths and provide fluidic resistance to cause a pressure drop across the fluid-resistance elements. Mass transfer occurs between the first microchannel and the second microchannel, which is indicative of the hydraulic conductivity and/or dynamic permeability associated with the cells.
    Type: Application
    Filed: August 7, 2019
    Publication date: November 28, 2019
    Inventors: Daniel Levner, Christopher David Hinojosa, Andries D. van der Meer, Marinke van der Helm, Abhishek Jain, Donald Elliot Ingber, Marjon Zamani
  • Publication number: 20190354619
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving a file operation, and determining a transaction identification which corresponds to the file operation. The transaction identification is used to create a unique queue which corresponds to the file operation. A number of fields included in the unique queue is equal to a number of sub-operations included in a predefined template associated with the file operation. Moreover, the number of fields included in the unique queue are populated as each of the respective number of sub-operations are performed. A determination is made as to whether each of the number of fields in the unique queue have been populated, and the unique queue is sent to a global queue in response to determining that each of the number of fields in the unique queue have been populated.
    Type: Application
    Filed: May 16, 2018
    Publication date: November 21, 2019
    Inventors: Abhishek Jain, William W. Owen, Ashish Pandey, Sandeep Naik, Sasikanth Eda
  • Publication number: 20190335335
    Abstract: Systems [100A/100B] and methods [700/800] for allocating wireless channel/s to wireless access point/s [102] are disclosed. More particularly, the embodiments of the present invention comprise steps of: determining at least one candidate wireless channel, providing an initial score to each of the at least one candidate wireless channel, determining a channel overlapping parameter and a signal strength factor, determining a channel score based on the initial score, the channel overlapping parameter, the signal strength factor and a reduction weight, applying a positive offset to update the channel score of each of the at least one candidate wireless channel, selecting the at least one wireless channel for the at least one wireless access point [102A] based on the updated channel score, and allocating the at least one wireless channel to the at least one wireless access point [102A].
    Type: Application
    Filed: April 29, 2019
    Publication date: October 31, 2019
    Inventors: Thomas John Schlangen, Ajay Kumar Gupta, Vishal Vasant Oak, Abhishek Jain, Mahesh Nayaka Mysore Annaiah, Tareq Amin
  • Publication number: 20190327777
    Abstract: Embodiments for managing a wireless communication network by one or more processors are described. The presence of a plurality of mobile electronic devices within a wireless communication network is detected. A device-to-device (D2D) connectability score for each of the plurality of mobile electronic devices is calculated. The calculating of the D2D connectability score for each of the plurality of mobile electronic devices is based on a security posture of the respective mobile electronic device, a privacy posture of the respective mobile electronic device, or a combination thereof. A signal representative of the calculated D2D connectability score for each of the plurality of mobile electronic devices is generated.
    Type: Application
    Filed: July 3, 2019
    Publication date: October 24, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gandhi SIVAKUMAR, Sandeep R. PATIL, Sasikanth EDA, Abhishek JAIN
  • Publication number: 20190310863
    Abstract: Embodiments for managing mobile electronic devices are described. At least one user-device interaction characteristic associated with a first mobile electronic device having a first set of hardware attributes is received. The operation of a second mobile electronic device having a second set of hardware attributes is tuned based on one or more of the at least one of the user-device interaction characteristics, a comparison of the first set of hardware attributes and the second set of hardware attributes, or a combination thereof.
    Type: Application
    Filed: April 6, 2018
    Publication date: October 10, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rajan D. MITHANI, Sasikanth EDA, Abhishek JAIN, Deepak GHUGE, Manojkiran EDA