Patents by Inventor Abhishek Singh
Abhishek Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250106246Abstract: Techniques are described herein for detecting an invalid (e.g., spoof) email before it is received by an intended recipient. In some embodiments, the techniques may involve, upon receiving an electronic communication directed to an intended recipient, determining, based on information included in the electronic communication, a claimed source entity, and determining a domain associated with the email communication. The techniques may further involve determining an owner entity associated with the domain and then determining that the electronic communication is valid based on a comparison between the owner entity and the claimed source entity. Upon determining that the electronic communication is not valid, the techniques may further comprise performing one or more mitigation techniques.Type: ApplicationFiled: September 26, 2023Publication date: March 27, 2025Inventors: Abhishek Singh, Shray Kapoor
-
Publication number: 20250102744Abstract: Technologies for fiber array unit (FAU) lid designs are disclosed. In one embodiment, channels in the lid allow for suction to be applied to fibers that the lid covers, pulling the fibers into place in a V-groove. The suction can hold the fibers in place as the fiber array unit is mated with a photonic integrated circuit (PIC) die. Additionally or alternatively, channels can be on pitch, allowing for pulling the FAU towards a PIC die as well as sensing the position and alignment of the FAU to the PIC die. In another embodiment, a warpage amount of a PIC die is characterized, and a FAU lid with a similar warpage is fabricated, allowing for the FAU to position fibers correctly relative to waveguides in the PIC die. In another embodiment, a FAU has an extended lid, which can provide fiber protection as well as position and parallelism tolerance control.Type: ApplicationFiled: September 27, 2023Publication date: March 27, 2025Applicant: Intel CorporationInventors: Feifei Cheng, Kumar Abhishek Singh, Peter A. Williams, Ziyin Lin, Fan Fan, Yang Wu, Saikumar Jayaraman, Baris Bicen, Darren Vance, Anurag Tripathi, Divya Pratap, Stephanie J. Arouh
-
Publication number: 20250103030Abstract: A system and method for monitoring and controlling an industrial process using a data model extensible to different industry applications. The system is configured to: receive data describing the industrial process from one or more data sources in a first format; contextualize and transform the data by determining one or more tags for the data, the one or more tags comprising context information describing characteristics of the entities involved in the industrial process; generate a data model describing the industrial process based on the one or more tags; receive a first indication from a user indicating a first industry application to which the data model will be applied; and extend the data model to include a second plurality of nodes representing entities associated with the first industry application and a second plurality of edges connecting the second plurality of nodes and describing relationships between the second plurality of nodes.Type: ApplicationFiled: September 27, 2023Publication date: March 27, 2025Applicant: ROCKWELL AUTOMATION TECHNOLOGIES, INC.Inventors: Abhishek Negi, Douglas D. Fisher, Jennifer M. Kite, Ajai Singh
-
Patent number: 12254765Abstract: A method and system are disclosed for collecting and maintaining road event information, where point-based road event location data from transportation authorities, construction companies, vehicle sensors, or combinations thereof, is susceptible to location sensor errors, digital map errors, and/or map mismatching errors. Errors less than a selected threshold are filtered by categorizing or grouping reports of point-based locations into segments along links in a representation of a road, providing improved accuracy of reporting of road events.Type: GrantFiled: December 23, 2021Date of Patent: March 18, 2025Assignee: HERE Global B.V.Inventors: Aparna Rajagopal, Abhishek Singh, Kripa Nair, Chirag Golechha, Zhenhua Zhang
-
Publication number: 20250083854Abstract: An improved apparatus 100 for cutting and squeezing sachets/pouches is disclosed, having a cutting and sliding assembly 200 configured to allow linear movement of one or more sachets/pouches and cut the one or more sachets/pouches as the one or more sachets/pouches undergo linear movement: and a roller assembly 300 configured to pull the one or more sachets/pouches through the cutting and sliding assembly. and squeeze the one or more sachets/pouches as the one or more sachets are pulled. the squeezing resulting in extracting contents of the one or more sachets/pouches. The cutting and sliding assembly 200 and the roller assembly 300 are accommodated within a container assembly 400 such that the squeezed out contents are collected within a container of the container assembly 400.Type: ApplicationFiled: July 8, 2022Publication date: March 13, 2025Inventors: Gurdeep SINGH, Abhishek SINGH, Sougata KARMAKAR
-
Publication number: 20250080577Abstract: This disclosure describes techniques and mechanisms to retroactively identifying, classifying, categorizing, and/or remediating campaigns by an email threat defense system. The described techniques may perform a time-series analysis on record data associated with emails and identify campaigns that have bypassed threat detection mechanisms. The described techniques may extract and correlate features of the record data in order to label and determine whether a campaign is malicious. Where the email campaign is malicious, remedial action(s) can occur. Accordingly, the described techniques may remediate false negatives in a network and improve network security.Type: ApplicationFiled: September 27, 2023Publication date: March 6, 2025Inventors: Abhishek Singh, Omid Mirzaei
-
Patent number: 12245305Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may establish, using a first subscription of the UE, a first communication connection associated with a first service. The UE may establish, using a second subscription of the UE, a second communication connection associated with a second service. The UE may operate in a dual subscriber identity module (SIM) dual active (DSDA) mode based at least in part on establishing the first communication connection and establishing the second communication connection. The UE may perform an action to maintain concurrent services, including the first service and the second service, while operating in the DSDA mode. Numerous other aspects are described.Type: GrantFiled: February 7, 2022Date of Patent: March 4, 2025Assignee: QUALCOMM IncorporatedInventors: Adam Hebein, Manisha Priyadarshini, Qin Xue Frantti, Brian A'Hearn, Rishav Rej, Qingxin Chen, Uttam Pattanayak, Vikram Singh, Bhupesh Manoharlal Umatt, Carlos Marcelo Dias Pazos, Cherng-Shung Hsu, Osama Lotfallah, Flora Pui San Chan, Abhishek Bhatnagar, Reza Shahidi, Cheol Hee Park, Subashini Krishnamurthy, Sandeep Ramannavar, Jun Hu, Shailesh Maheshwari, Hemanth Kumar Rayapati, Krishna Chaitanya Mukkera
-
Patent number: 12244562Abstract: Techniques for an email-security system to screen emails, extract information from the emails, analyze the information, assign probability scores to the emails, and classify the emails as likely fraudulent or not. The system may analyze emails for users and identify fraudulent emails by analyzing the contents of the emails. The system may evaluate the contents of the emails to determine probability score(s) which may further determine an overall probability score. The system may then classify the email as fraudulent, or not, and may perform actions including blocking the email, allowing the email, flagging the email, etc. In some instances, the screened emails may include legitimate brand domain addresses, names, images, URL(s), and the like. However, the screened emails may contain a reply-to domain address that matches a free email service provider domain. In such instances, the email-security system may assign a probability score indicative that the screened email is fraudulent.Type: GrantFiled: July 18, 2022Date of Patent: March 4, 2025Assignee: Cisco Technology, Inc.Inventors: Durgamadhav Behera, Abhishek Singh, Muhammad Sachedina
-
Patent number: 12238054Abstract: Techniques for an email-security system to detect multi-stage email scam attacks, and engage an attacker to obtain additional information. The system may analyze emails for users and identify scam emails by analyzing metadata of the emails. The system may then classify the scam emails into particular classes from among a group of scam-email classes. The system may then engage the attacker that sent the scam email. In some instances, the scam emails may be multi-stage attacks, and the system may automatically engage the attacker to move to the next stage of the scam attack. For instance, the system may send a lure email that is responsive to the particular scam class to prompt or provoke the attacker to send more sensitive information, such as a phone number, a bank account, etc. The system may then harvest this sensitive information of the attacker, and use that information for various remedial actions.Type: GrantFiled: March 21, 2022Date of Patent: February 25, 2025Assignee: Cisco Technology, Inc.Inventors: Fahim Abbasi, Abhishek Singh, Muhammad Sachedina
-
Publication number: 20250061728Abstract: Methods, systems, and non-transitory computer-readable media are configured to perform operations comprising determining an image of an environment. A drivable area and boundary information associated with the environment are determined based on the image. At least one boundary for navigation of the environment is generated based on the drivable area and boundary information.Type: ApplicationFiled: November 7, 2024Publication date: February 20, 2025Inventors: Inderjot Singh Saggu, Abhishek Bhatia, Ankur Agarwal
-
Publication number: 20250045761Abstract: Methods, systems, and media for screening users of a virtual environment are provided.Type: ApplicationFiled: March 15, 2024Publication date: February 6, 2025Inventors: Tanishq Nimale, Prashant Jawale, Abhishek Vyas, Adarsh Singh, Vinay Gaykar
-
Patent number: 12217064Abstract: A correlation engine and policy manager (CPE) system includes: a persistent database, a cache database, an event gate, an event enricher, an event transformer, and an event dispatcher. The event gate obtains event data from at least one event source, and forwards the event data to the event enricher. The event enricher enriches the event data with additional data in the cached business layer data of the cache database, and forwards the enriched event data to the event transformer. The event transformer applies one or more policies in a cached business layer data of the cache database to the enriched event data to obtain transformed event data, and outputs the transformed event data to be stored in the persistent database. The event dispatcher dispatches output data to cause or prompt an action responsive to the transformed event data satisfying the at least one policy.Type: GrantFiled: January 14, 2022Date of Patent: February 4, 2025Assignee: RAKUTEN MOBILE, INC.Inventors: Jyoti Bose, Mihirraj Narendra Dixit, Surender Singh Lamba, Abhishek Sharma
-
Publication number: 20250036720Abstract: Embodiments provide for intelligent report configuration. Some embodiments aggregate historical configuration data based at least in part on a plurality of historical reports, receive a signal indicative of a configuration request for a report having a hierarchical data structure, identify at least one configuration node of a report configuration workflow for configuring the report. The report configuration workflow may be defined by a hierarchical arrangement of a plurality of configuration nodes. Some embodiments generate, based at least in part on the historical configuration data and using one or more models, one or more data objects for the at least one configuration node. The one or more data objects may be indicative of at least a portion of the configuration data for one or more portions of the report. Some embodiments cause display of the one or more data objects on a configuration user interface rendered on a user device.Type: ApplicationFiled: July 28, 2023Publication date: January 30, 2025Inventors: Ankit Singh, Arun Ramasubrahmanyan, Timothy Sneed, Abhishek Hiremath
-
Publication number: 20250028691Abstract: Described are techniques for disintegrating an entity into smaller entities. A graph (“first graph”) for the entity of records to be disintegrated is constructed, where each vertex of the first graph represents a record in the entity of records to be disintegrated. The edges in the first graph connecting records in the entity of records represent matching links between the records, where each edge is associated with a weight corresponding to a similarity score. Furthermore, two or more additional graphs representing two or more sub-entities of the entity of records to be disintegrated are constructed. Such graphs are constructed based on selecting edges with a maximum weight out of the edges connected between each pair of records in the first graph or based on the number of connections each record has with other records in the first graph exceeding a threshold value.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Inventors: Abhishek Seth, Soma Shekar Naganna, Mahendra Singh Kanyal, Devbrat Sharma
-
Publication number: 20250030596Abstract: Techniques are disclosed for migrating one or more services from an edge device to a cloud computing environment. In one example, a migration service receives a request to migrate a first set of services from the edge device to the cloud computing environment. The migration service identifies a hardware profile of a computing device (or devices) of the cloud computing environment that matches the edge device, and then configures the computing device to execute a second set of services that corresponds to the first set of services. The migration service establishes a communication channel between the edge device and the computing device, and then executes a set of migration operations such that the second set of services is configured to execute as the first set of services. The computing device may operate in a virtual bootstrap environment or dedicated region of the cloud computing environment.Type: ApplicationFiled: October 4, 2024Publication date: January 23, 2025Applicant: Oracle International CorporationInventors: Eden Grail Adogla, David Dale Becker, Maxim Baturin, Brijesh Singh, Iliya Roitburg, Abhishek Kar
-
Publication number: 20250005462Abstract: The method can include optionally training a transportation modality classification model; determining a transportation modality of a trip; and optionally triggering an action based on the transportation modality. However, the method can additionally or alternatively include any other suitable elements. The method functions to facilitate a classification of a transportation modality for trips based on location data (e.g., collected at a mobile device). Additionally or alternatively, the method can function to facilitate content provisions based on a trip classification.Type: ApplicationFiled: July 3, 2024Publication date: January 2, 2025Applicant: Credit Karma, LLCInventors: Sambuddha Bhattacharya, Amol Bambode, Laxman Jangley, Darshan Shirodkar, Rajesh Bhat, Abhishek Singh
-
Publication number: 20240430163Abstract: Provisioning of day-1 configuration templates is automated. Users are provided access to a Configuration Template User Interface (UI) for creating configuration templates. Input is received on the Configuration Template UI to create the configuration templates. A trigger is received by a configuration manager to initiate configuration of network devices or functions. The trigger includes one or more Template Identifiers (IDs) corresponding to the one or more configuration templates. Configuration files are generated based on the trigger and one or more Template IDs corresponding to the one or more configuration templates. Configuration files are sent from the configuration manager to the one or more network devices or functions to configure the one or more network devices or functions.Type: ApplicationFiled: January 6, 2023Publication date: December 26, 2024Inventors: Aaditya DHARAMPURIKAR, Rahul GUPTA, Abhishek SINGH, Biplav KUMAR, Ashutosh DAS
-
Publication number: 20240404063Abstract: Techniques are disclosed for framing images and/or video streams. Such techniques may include performing face detection on an image, determining a gaze direction within image content associated with a detected face, and defining a cropping window for the image based on the detected face and the determined gaze direction of the detected face. Thereafter, the image may be cropped according to the cropping window.Type: ApplicationFiled: April 30, 2024Publication date: December 5, 2024Inventors: Abhishek SINGH, Vinay SHARMA, Aman RAJ, Tim KO, Shuang GAO
-
Publication number: 20240395015Abstract: A system and method of open-world semi-supervised satellite object detection involves a machine learning engine configured with a training component and an inference component. The method of object detection detects objects in satellite imagery represents a solution for difficult challenges of arbitrary orientations, wide variation in object sizes, large number of densely packed objects, and highly complex background. A transformer network detects unknown objects in the satellite image. The transformer network includes a rotation-aware pyramidal pseudo-labeling operation that captures scale-specific pyramidal features at oriented box regions for pseudo-labeling unknown objects in the satellite image. A semi-supervised learning pipeline learns a new set of object classes to be detected. A prediction head outputs the satellite image annotated with a predicted object class for an unknown object.Type: ApplicationFiled: May 25, 2023Publication date: November 28, 2024Applicant: Mohamed bin Zayed University of Artificial IntelligenceInventors: Sahal Shaji MULLAPPILLY, Abhishek Singh GEHLOT, Hisham CHOLAKKAL, Rao Muhammad ANWER, Fahad Shahbaz KHAN
-
Publication number: 20240386113Abstract: Techniques are described for protecting services containing web applications from malicious attacks. A data flow that includes a stack trace and a process is received from a web application. The stack trace is chained with the process to generate a data flow graph. A data lake is then accessed to determine whether the data flow graph is in the data lake. If the data flow graph is not in the data lake, then the data flow can be considered safe. If the data flow graph is not already in the data lake, then a determination is made as to whether the data flow includes a command that accepts user input. If it is determined that the data flow does include a command that accepts user input, then the data flow can be considered to be malicious and the process is terminated to protect the web application from a malicious attack.Type: ApplicationFiled: May 16, 2023Publication date: November 21, 2024Inventor: Abhishek Singh