Patents by Inventor Abhishek Shukla
Abhishek Shukla has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10705870Abstract: The disclosed technology is generally directed to virtual machines. In one example of the technology, a network change from a first virtual network having a first customer Internet Protocol (IP) address to a second virtual network having a second customer IP address is configured for a first virtual machine. The configuring includes controlling the following actions. The second virtual network is provided. At least one networking artifact is associated with a first user that is associated with the first virtual machine. The at least one networking artifact includes the second virtual network. A directory service is updated to map the second customer IP address to a first physical IP address. The first physical IP address is a physical IP address of the first virtual network.Type: GrantFiled: March 8, 2018Date of Patent: July 7, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Sushant Pramod Rewaskar, Md. Daud Hossain Howlader, Ashish Bhargava, Nisheeth Srivastava, Naveen Prabhat, Jayesh Kumaran, Xinyan Zan, Abhishek Shukla, Rishabh Tewari
-
Publication number: 20200141190Abstract: A tool can be used remove one or more outer layers of a tubular such as a flexible pipeline to enable an inspection on the remaining layers of the flexible pipeline. It allows the precise removal of outer layers of a flexible riser so that inspection can take place tubulars that otherwise could not be inspected with ultrasound.Type: ApplicationFiled: December 7, 2018Publication date: May 7, 2020Applicant: Oceaneering International, Inc.Inventors: Daniel J. Scoville, Ryan Bradley, Abhishek Shukla
-
Patent number: 10641048Abstract: A condition of a flexible pipeline may be monitored by scanning a section of the flexible pipeline with an ultrasonic scanner and using the ultrasonic scanner to produce a first ultrasonic signal that penetrates the section of the flexible pipeline and is used to create a set of condition data indicative of a condition present near or within an annulus of the flexible pipeline, the condition comprising pressure on or within the flexible pipeline.Type: GrantFiled: May 20, 2019Date of Patent: May 5, 2020Assignee: Oceaneering International, Inc.Inventors: James Dennett, Christopher Cull, Robert Jenkins, Abhishek Shukla
-
Publication number: 20200099656Abstract: The techniques described herein enable a private connectivity solution between a virtual network of a service consumer and a virtual network of a service provider in a cloud-based platform. The techniques map a service (e.g., one or more workloads or containers) executing in the virtual network of the service provider into the virtual network of the service consumer. The mapping uses network address translation (NAT) that is performed by the cloud-based infrastructure. As a result of the techniques described herein, a public Internet Protocol (IP) address does not need to be used to establish a connection thereby alleviating privacy and/or security concerns for the virtual networks of the service provider and/or the service consumer that are hosted by the cloud-based platform.Type: ApplicationFiled: January 30, 2019Publication date: March 26, 2020Inventors: Sumeet MITTAL, Abhishek SHUKLA, Rishabh TEWARI, Qiming CHEN, Harish Kumar CHANDRAPPA, Pranjal SHRIVASTAVA, Anitha ADUSUMILLI, Parag SHARMA, Abhishek Ellore SREENATH
-
Publication number: 20200097310Abstract: A virtual network interface controller (NIC) associated with a virtual machine in a cloud computing network is configured to support one or more network containers that encapsulate networking configuration data and policies that are applicable to a specific discrete computing workload to thereby enable the virtual machine to simultaneously belong to multiple virtual networks using the single NIC. The network containers supported by the NIC can be associated with a single tenant to enable additional flexibility such quickly switching between virtual networks and support pre-provisioning of additional computing resources with associated networking policies for rapid deployment. The network containers can also be respectively associated with different tenants so that the single NIC can support multi-tenant services on the same virtual machine.Type: ApplicationFiled: September 25, 2018Publication date: March 26, 2020Inventors: Abhishek SHUKLA, Abhishek Ellore SREENATH, Neha AGGARWAL, Naveen PRABHAT, Nisheeth SRIVASTAVA, Xinyan ZAN, Ashish BHARGAVA, Parag SHARMA, Rishabh TEWARI
-
Publication number: 20200092271Abstract: The disclosed system implements techniques to secure communications for injecting a workload (e.g., a container) into a virtual network hosted by a cloud-based platform. Based on a delegation instruction received from a tenant, a virtual network of the tenant can connect to and execute a workload via a virtual machine that is part of a virtual network that belongs to a resource provider. To secure calls and authorize access to the tenant's virtual network, authentication information provided in association with a call from the virtual network of the resource provider may need to match authorization information made available via a publication service of the cloud-based platform. Moreover, an identifier of a NIC used to make a call may need to correspond to a registered name of the resource provider for the call to be authorized. These checks provide increased security by preventing unauthorized calls from accessing the tenant's virtual network.Type: ApplicationFiled: December 27, 2018Publication date: March 19, 2020Inventors: Abhijeet KUMAR, Aanand RAMACHANDRAN, Jayesh KUMARAN, David Michael BRUMLEY, Rishabh TEWARI, Nisheeth SRIVASTAVA, Sushant SHARMA, Deepak BANSAL, Abhishek Ellore SREENATH, Parag SHARMA, Abhishek SHUKLA, Avijit GUPTA
-
Publication number: 20190352974Abstract: A condition of a flexible pipeline may be monitored by scanning a section of the flexible pipeline with an ultrasonic scanner and using the ultrasonic scanner to produce a first ultrasonic signal that penetrates the section of the flexible pipeline and is used to create a set of condition data indicative of a condition present near or within an annulus of the flexible pipeline, the condition comprising pressure on or within the flexible pipeline.Type: ApplicationFiled: May 20, 2019Publication date: November 21, 2019Applicant: Oceaneering International, Inc.Inventors: James Dennett, Christopher Cull, Robert Jenkins, Abhishek Shukla
-
Publication number: 20190149411Abstract: The disclosed technology is generally directed to virtual machines. In one example of the technology, a network change from a first virtual network having a first customer Internet Protocol (IP) address to a second virtual network having a second customer IP address is configured for a first virtual machine. The configuring includes controlling the following actions. The second virtual network is provided. At least one networking artifact is associated with a first user that is associated with the first virtual machine. The at least one networking artifact includes the second virtual network. A directory service is updated to map the second customer IP address to a first physical IP address. The first physical IP address is a physical IP address of the first virtual network.Type: ApplicationFiled: March 8, 2018Publication date: May 16, 2019Inventors: Sushant Pramod REWASKAR, Md. Daud Hossain HOWLADER, Ashish BHARGAVA, Nisheeth SRIVASTAVA, Naveen PRABHAT, Jayesh KUMARAN, Xinyan ZAN, Abhishek SHUKLA, Rishabh TEWARI
-
Publication number: 20190146823Abstract: The disclosed technology is generally directed to virtual machines. In one example of the technology, a network change from a first virtual network to a second virtual network is reconfigured for a first virtual machine that is executing on a first virtual machine host. The reconfiguring includes the following. In the first virtual machine host, a mapping change from the first virtual network to the second virtual network is configured by reprogramming drivers in the first virtual machine host for route mapping for the second virtual network. A Dynamic Host Configuration Protocol (DHCP) retrigger is caused without rebooting the first virtual machine. A configuration file is provided to the first virtual machine. The configuration file includes user-specific networking settings. The first virtual machine is reconfigured in accordance with the user-specific networking settings.Type: ApplicationFiled: January 14, 2018Publication date: May 16, 2019Inventors: Sushant Pramod REWASKAR, Md. Daud Hossain HOWLADER, Ashish BHARGAVA, Nisheeth SRIVASTAVA, Naveen PRABHAT, Jayesh KUMARAN, Xinyan ZAN, Abhishek SHUKLA, Rishabh TEWARI
-
Publication number: 20180347993Abstract: Systems and methods are provided for processing map data. The systems and methods calculate road curvature data for a curved road segment along a road based on measured data obtained from a measuring unit of a vehicle moving along the road. The systems and methods perform a map processing function on road map data for the road including the curved road segment based on the calculated road curvature data correlated with the global positioning data. The systems and methods include outputting result data resulting from the map processing function.Type: ApplicationFiled: May 31, 2017Publication date: December 6, 2018Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: SARMAD Y. HERMIZ, BING DENG, ROBERT D. SAUVOLA, ABHISHEK SHUKLA, RAYMOND G. ACKER
-
Patent number: 9912654Abstract: Architecture that provides Internet Protocol security (IPsec) certificate exchange based on certificate attributes. An IPsec endpoint can validate the security context of another IPsec endpoint certificate by referencing certificate attributes. By facilitating IPsec certificate exchange using certificate attributes rather than solely certificate roots, it is now possible to build multiple isolated network zones using a single certificate authority rather than requiring one certificate authority per zone. Moreover, the ability to use certificate attributes during the IPsec certificate exchange can be leveraged for more focused communications such as QoS (quality of service). Certificate attributes can be utilized to identify the security context of the endpoint. The IPsec certificate use can be locked down to a single IP or group of IPs.Type: GrantFiled: November 12, 2009Date of Patent: March 6, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Anatoliy Panasyuk, Dharshan Rangegowda, Abhishek Shukla
-
Publication number: 20160047687Abstract: Systems, methods, and devices for determining distances inside a liquid filled container such as an oil tank. A combined ultrasonic signal receiver/transmitter with an attached reflector is immersed in the liquid. An ultrasonic signal is then transmitted from the receiver/transmitter and reflected ultrasonic signals are then received. One of the reflected signals is reflected off of the attached reflector and this reflected signal is then used to determine the signal's velocity and to thereby self-calibrate the system. Once the velocity in the liquid is known, the other reflected signals can then be used to determine the distance between the receiver/transmitter and at least one point of interest in the container.Type: ApplicationFiled: March 21, 2014Publication date: February 18, 2016Inventors: Anand PRAKASH, Abhishek SHUKLA, Richard HONE
-
Patent number: 8942928Abstract: Methods and are provided for determining, monitoring or detecting particle size distribution of a medium. An example method includes comparing a measured ultrasound attenuation spectrum of the medium with a calculated attenuation spectrum, where the calculated attenuation spectrum is obtained by accounting for the scattering of ultrasound waves into the receiver. The methods of the present invention can be used to determine particle size distribution in a dense suspension of particles in the intermediate wavelength regime. In other aspects, methods of the present invention may also be used to monitor changes in particle size distribution, infer the shape of particles, provide feedback to a process involving a change in particle size, and determine the completion of a dissolution process.Type: GrantFiled: January 18, 2010Date of Patent: January 27, 2015Assignee: The University of Western OntarioInventors: Anand Prakash, Abhishek Shukla, Sohrab Rohani
-
Patent number: 8229779Abstract: A method and system for workflow management in a business process environment is disclosed. In one embodiment, a method includes determining respective attributes of a plurality of business documents received via an input device of the computing device, and receiving a set of business rules associated with the plurality of business documents. The set of business rules are based on the attributes of the plurality of business documents. The method also includes forming a plurality of queue filters for segregating a set of transactions associated with the plurality of business documents based on the set of business rules, and forming a plurality of queues based on the plurality of queue filters and at least one activity associated with the set of transactions. Further, the method includes generating on a display of the computing device, a list of agents assigned for each of the plurality of queues.Type: GrantFiled: December 14, 2009Date of Patent: July 24, 2012Assignee: Wipro LimitedInventors: Sumanta Basu, Abhishek Shukla, Amit Vikram, Arundat M Dasari
-
Publication number: 20120111117Abstract: The present invention provides embodiments relating to novel methods for determining, monitoring or detecting particle size distribution of a medium. In a preferred embodiment, the method comprises comparing a measured ultrasound attenuation spectrum of the medium with a calculated attenuation spectrum, where the calculated attenuation spectrum is obtained by accounting for the scattering of ultrasound waves into the receiver. The methods of the present invention can be used to determine particle size distribution in a dense suspension of particles in the intermediate wavelength regime. In other aspects, methods of the present invention may also be used to monitor changes in particle size distribution, infer the shape of particles, provide feedback to a process involving a change in particle size, and determine the completion of a dissolution process.Type: ApplicationFiled: January 18, 2010Publication date: May 10, 2012Applicant: THE UNIVERSITY OF WESTERN ONTARIOInventors: Anand Prakash, Abhishek Shukla, Sohrab Rohani
-
Publication number: 20110145031Abstract: A method and system for workflow management in a business process environment is disclosed. In one embodiment, a method includes determining respective attributes of a plurality of business documents received via an input device of the computing device, and receiving a set of business rules associated with the plurality of business documents. The set of business rules are based on the attributes of the plurality of business documents. The method also includes forming a plurality of queue filters for segregating a set of transactions associated with the plurality of business documents based on the set of business rules, and forming a plurality of queues based on the plurality of queue filters and at least one activity associated with the set of transactions. Further, the method includes generating on a display of the computing device, a list of agents assigned for each of the plurality of queues.Type: ApplicationFiled: December 14, 2009Publication date: June 16, 2011Inventors: SUMANTA BASU, Abhishek Shukla, Amit Vikram, Arundat M. Dasari
-
Publication number: 20110113481Abstract: Architecture that provides Internet Protocol security (IPsec) certificate exchange based on certificate attributes. An IPsec endpoint can validate the security context of another IPsec endpoint certificate by referencing certificate attributes. By facilitating IPsec certificate exchange using certificate attributes rather than solely certificate roots, it is now possible to build multiple isolated network zones using a single certificate authority rather than requiring one certificate authority per zone. Moreover, the ability to use certificate attributes during the IPsec certificate exchange can be leveraged for more focused communications such as QoS (quality of service). Certificate attributes can be utilized to identify the security context of the endpoint. The IPsec certificate use can be locked down to a single IP or group of IPs.Type: ApplicationFiled: November 12, 2009Publication date: May 12, 2011Applicant: Microsoft CorporationInventors: Anatoliy Panasyuk, Dharshan Rangegowda, Abhishek Shukla