Patents by Inventor Abhishek Kumar Mishra
Abhishek Kumar Mishra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240312335Abstract: Embodiments herein disclose a method and alarm monitoring device (200) for alarm monitoring and de-duplicating alarms in a wireless network (100). The method comprises receiving a first alarm event (404) and second alarm events from a plurality of devices (100A-100N) in the wireless network. The method further comprises de-duplicating the second alarm events by merging the second alarm events with the first alarm event (404) based on a retrieved current status of the first alarm event (404) when the second alarm events are received within a predefined time period. The method further comprises inserting the second alarm events separately in a database based on the retrieved current status of the first alarm event (404) when the second alarm events are not received within the predefined time period.Type: ApplicationFiled: December 27, 2022Publication date: September 19, 2024Applicant: RAKUTEN MOBILE, INC.Inventors: Hemant GUPTA, Nimit AGRAWAL, Abhishek Kumar MISHRA
-
Patent number: 12091189Abstract: Systems and methods enabling user control over use of aircraft sensors located onboard an aircraft. The method receives sensor signals comprising any combination of ADS signals, IRS signals and a third RA signals, and GPS signals; comparing sensor data values in the sensor signals to each other and to respective acceptable thresholds and critical thresholds that are preprogrammed; grouping avionic systems on-board the aircraft into subgroups having a same sensor reliance; presenting a graphical user interface (GUI) page on the display system, the GUI page identifying a sensor subgroup, the aircraft sensors of the respective sensor subgroup, and respective critical sensor parameters and associated critical sensor parameter data; visually distinguishing an critical sensor parameter data that exceeds the respective acceptable threshold or exceeds the respective critical threshold; and, accepting user deselections of aircraft sensors via the GUI page.Type: GrantFiled: February 17, 2022Date of Patent: September 17, 2024Assignee: HONEYWELL INTERNATIONAL INC.Inventors: Jan Urbanec, Abhishek Kumar Mishra
-
Patent number: 12063141Abstract: A system for collecting discarded alarm includes a non-transitory computer readable medium configured to store instructions thereon. The system further includes a processor connected to the non-transitory computer readable medium. The processor is configured to execute the instructions for receiving alarm data from a device within a telecommunication network. The processor is further configured to execute the instructions for determining whether the alarm data is missing identifying information. The processor is further configured to execute the instructions for subjecting the alarm data to suppression in response to a determination that the alarm data is missing at least one piece of identifying information. The processor is further configured to execute the instructions for generating instructions for addressing an alarm in response to a determination that the alarm data includes all identifying information.Type: GrantFiled: May 20, 2022Date of Patent: August 13, 2024Assignee: RAKUTEN SYMPHONY SINGAPORE PTE. LTD.Inventors: Abhishek Kumar Mishra, Nimit Agrawal
-
Publication number: 20240195674Abstract: A system for collecting discarded alarm includes a non-transitory computer readable medium configured to store instructions thereon. The system further includes a processor connected to the non-transitory computer readable medium. The processor is configured to execute the instructions for receiving alarm data from a device within a telecommunication network. The processor is further configured to execute the instructions for determining whether the alarm data is missing identifying information. The processor is further configured to execute the instructions for subjecting the alarm data to suppression in response to a determination that the alarm data is missing at least one piece of identifying information. The processor is further configured to execute the instructions for generating instructions for addressing an alarm in response to a determination that the alarm data includes all identifying information.Type: ApplicationFiled: May 20, 2022Publication date: June 13, 2024Inventors: Abhishek Kumar MISHRA, Nimit AGRAWAL
-
Publication number: 20240187313Abstract: A system for aggregating alarms for a network includes a non-transitory computer readable medium configured to store instructions thereon. The system further includes a processor connected to the non-transitory computer readable medium. The processor is configured to execute the instructions for receiving information for configuring alarm data. The processor is configured to execute the instructions for aggregating alarm data based on the information for configuring alarm data. The processor is configured to execute the instructions for generating a visual representation of the aggregated alarm data. The processor is configured to execute the instructions for instructing a display to display the visual representation on a graphical user interface (GUI). The processor is configured to execute the instructions for receiving filter criteria through the GUI. The processor is configured to execute the instructions for updating the display on the GUI based on the filter criteria.Type: ApplicationFiled: June 15, 2022Publication date: June 6, 2024Inventors: Abhishek Kumar MISHRA, Nimit AGRAWAL, Hemant GUPTA
-
Publication number: 20240179048Abstract: Systems and methods of setting rules that automate the creation of a ticket related to incidents on a computer network. In some embodiments, incident management data structures are stored, each of the incident management data structures includes one or more defined incident identification characteristics and one or more automated ticket generation rules. A network incident data structure are received that describes a network incident on a network. A target incident management data structure are selected from the incident management data structures based on the defined automated incident identification characteristics of the target incident management data structure matching the network incident described by the network incident data structure. A ticket incident data structure is generated in accordance with the one or more automated ticket generation rules of the target incident management data structure.Type: ApplicationFiled: April 13, 2022Publication date: May 30, 2024Inventors: Abhishek Kumar MISHRA, Palak BAJAJ
-
Publication number: 20240171476Abstract: Systems and methods of setting rules that automate the creation of a ticket related to incidents on a computer network. In some embodiments, a graphical user interface (GUI) is presented, wherein the GUI includes one or more first graphical items for defining a network incident type on a network. One or more user selections of the one or more first graphical items are received. One or more automated incident identification characteristics of an incident management data structure are generated based on the user selections of the first graphical items. User input is received in the GUI that defines one or more automated ticket generation rules of the incident management data structure.Type: ApplicationFiled: April 1, 2022Publication date: May 23, 2024Inventors: Abhishek Kumar MISHRA, Palak BAJAJ
-
Publication number: 20240039780Abstract: A system includes a non-transitory computer readable medium configured to store instructions thereon; and a processor. The processor is configured to receive alarm data related to equipment in a telecommunication network. The processor is configured to receive a correlation rule and a mass outage rule, wherein each mass outage rule is associated with a correlation rule. The processor is configured to perform a first aggregation using the alarm data based on domain, vendor, equipment type, classification, or geographic information; and associate the aggregated alarm data with a corresponding correlation rule. The processor is configured to determine a number of pieces of equipment that are associated with each correlation rule; determine whether the determined number is equal to or greater than a threshold value; and generate an incident report in response to the number of pieces of equipment being equal to or greater than the at least one threshold value.Type: ApplicationFiled: December 30, 2021Publication date: February 1, 2024Inventors: Nimit AGRAWAL, Abhishek Kumar MISHRA
-
Publication number: 20230211894Abstract: Systems and methods enabling user control over use of aircraft sensors located onboard an aircraft. The method receives sensor signals comprising any combination of ADS signals, IRS signals and a third RA signals, and GPS signals; comparing sensor data values in the sensor signals to each other and to respective acceptable thresholds and critical thresholds that are preprogrammed; grouping avionic systems on-board the aircraft into subgroups having a same sensor reliance; presenting a graphical user interface (GUI) page on the display system, the GUI page identifying a sensor subgroup, the aircraft sensors of the respective sensor subgroup, and respective critical sensor parameters and associated critical sensor parameter data; visually distinguishing an critical sensor parameter data that exceeds the respective acceptable threshold or exceeds the respective critical threshold; and, accepting user deselections of aircraft sensors via the GUI page.Type: ApplicationFiled: February 17, 2022Publication date: July 6, 2023Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Jan Urbanec, Abhishek Kumar Mishra
-
Publication number: 20150197914Abstract: A bucket linkage assembly for a construction machine is disclosed. The bucket linkage assembly is positioned between a work tool and a work tool hydraulic cylinder of the construction machine. The bucket linkage assembly includes a bucket linkage member having a first end attachable to the work tool and a second end attachable to the work tool hydraulic cylinder. Further, the bucket linkage member defines a slot therethrough and a mounting surface thereon. The bucket linkage assembly further includes a lifting eye having an eye portion and a flange portion. The eye portion extends through the slot in the bucket linkage member and the flange portion is mounted to the mounting surface of the bucket linkage member.Type: ApplicationFiled: January 10, 2014Publication date: July 16, 2015Applicant: Caterpillar Inc.Inventors: ABHISHEK KUMAR GAURAV, ABHISHEK KUMAR MISHRA, ANTONY GRIEG JOSEPH
-
Publication number: 20140203519Abstract: A seal protection system for use with protecting a seal assembly between a motor housing and a final drive assembly. The seal protection system includes a seal protector assembly having a first band portion and a second band portion. The first band portion is removably attached to the second band portion. Further, a compressible element is provided as a continuous resilient layer along an outer edge section of the first and second band portions. The first band portion and the second band portion are structured and arranged in a manner to overlay the seal assembly in a first position. Moreover, the first band portion and the second band portion are structured and arranged to separate relative to the seal assembly in a second position. In addition, the compressible element is disposed between the first and second band portions and one of the motor housing or the final drive assembly.Type: ApplicationFiled: March 25, 2014Publication date: July 24, 2014Applicant: Caterpillar Inc.Inventors: ABHISHEK KUMAR GAURAV, ABHISHEK KUMAR MISHRA, ANTONY GRIEG JOSEPH
-
Patent number: 8254891Abstract: A client application allows a user of a telecommunication device to retrieve contact data of a particular individual from a server to initiate contact with the particular individual without viewing content designated as private by the particular individual. The retrieved contact data includes encrypted content and non-encrypted content. The telecommunication device sends a directory request to the server requesting contact data from an electronic directory stored on the server. If the directory request is validated by the server, the telecommunication device receives the requested contact data from the server. The telecommunication device also receives a decryption key and a key expiration parameter from the server. The client application executing on the telecommunication device can use the decryption key within a time period defined by the key expiration parameter to decrypt encrypted contacted data on the telecommunication device to initiate contact with the particular individual.Type: GrantFiled: August 4, 2006Date of Patent: August 28, 2012Assignee: Microsoft CorporationInventor: Abhishek Kumar Mishra
-
Publication number: 20080044030Abstract: A sever application allows an administrator of a server to selectively designate contact data of a particular individual to be encrypted prior to storage in a shared electronic directory. The server application encrypts any designated content and stores the encrypted content in the shared electronic directory. The server application is responsive to a valid directory request received from a user of a telecommunication device to transfer encrypted content and non-encrypted content to the telecommunication device. The server application also transfers a decryption key and a key expiration parameter from the server to the telecommunication device. A client application executing on the telecommunication device can use the decryption key within a time period defined by the key expiration parameter to decrypt encrypted contacted data on the telecommunication device to initiate contact with the particular individual.Type: ApplicationFiled: August 4, 2006Publication date: February 21, 2008Applicant: MICROSOFT CORPORATIONInventor: Abhishek Kumar Mishra
-
Publication number: 20080044031Abstract: A client application allows a user of a telecommunication device to retrieve contact data of a particular individual from a server to initiate contact with the particular individual without viewing content designated as private by the particular individual. The retrieved contact data includes encrypted content and non-encrypted content. The telecommunication device sends a directory request to the server requesting contact data from an electronic directory stored on the server. If the directory request is validated by the server, the telecommunication device receives the requested contact data from the server. The telecommunication device also receives a decryption key and a key expiration parameter from the server. The client application executing on the telecommunication device can use the decryption key within a time period defined by the key expiration parameter to decrypt encrypted contacted data on the telecommunication device to initiate contact with the particular individual.Type: ApplicationFiled: August 4, 2006Publication date: February 21, 2008Applicant: MICROSOFT CORPORATIONInventor: Abhishek Kumar Mishra