Patents by Inventor Aditya Kumar

Aditya Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170063553
    Abstract: Improved document processing workflows provide a secure electronic signature framework by reducing attack vectors that could be used to gain unauthorized access to digital assets. In one embodiment an electronically signed document is removed from an electronic signature server after signed copies of the document are distributed to all signatories. The electronic signature server optionally retains an encrypted copy of the signed document, but does not retain the decryption password. This limits the amount of data retained by the electronic signature server, making it a less attractive target for hackers. However, the electronic signature server still maintains audit data that can be used to identify a signed document and validate an electronic signature. For example, a hash of the document (or other document metadata) can be used to validate the authenticity of an electronically signed document based on a logical association between an electronic signature and the signed document.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Applicant: Adobe Systems Incorporated
    Inventors: Neha Saxena, Divij Kumar, Aditya Kumar Pandey
  • Publication number: 20170032463
    Abstract: Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, automatically tag and group those clustered data structures, and provide results of the automated analysis and grouping in an optimized way to an analyst. The automated analysis of the clustered data structures (also referred to herein as data clusters) may include an automated application of various criteria, rules, indicators, or scenarios so as to generate scores, reports, alerts, or conclusions that the analyst may quickly and efficiently use to evaluate the groups of data clusters.
    Type: Application
    Filed: August 17, 2016
    Publication date: February 2, 2017
    Inventors: Sean Hunter, Aditya Kumar, Jacob Albertson
  • Publication number: 20170017646
    Abstract: The present disclosure is directed toward systems and methods for managing electronic documents. For example, systems and methods described herein can enable parties to an agreement outlined in an electronic document to add, track, and save electronic signatures associated with the electronic document. Furthermore, systems and methods described herein automatically identify expiration information associated with the electronic document and generate alerts for the electronic document based on the expiration information.
    Type: Application
    Filed: July 14, 2015
    Publication date: January 19, 2017
    Inventors: Divij Kumar, Neha Saxena, Aditya Kumar Pandey
  • Publication number: 20160342377
    Abstract: A presentation state is received from the presenting application. The presentation state may represent a current state of the local presentation. A request for the presentation state is received from the viewing application. In response to receiving the request for the presentation state, the presentation state is provided to the viewing application. A request for presentation data synchronized to the presentation state is received from the viewing application. In response to receiving the request for presentation data synchronized to the presentation state, the presentation file is transformed into the presentation data synchronized to the presentation state. The presentation data synchronized to the presentation state is provided to the viewing application. The viewing application may be operative to read the presentation data and to display a remote presentation in response to reading the presentation data.
    Type: Application
    Filed: August 4, 2016
    Publication date: November 24, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Nathan Robert Penner, Sharad Kumar Garg, Aditya Kumar, Gideon Goodwin
  • Patent number: 9460247
    Abstract: A simulation technique that handles accesses to a frame of instruction memory by inserting a command object between a frame proxy and a memory frame provides improved throughput in simulation environments. The instruction frame, if present, processes the access to the frame. If an instruction frame is not present for the accessed frame, the memory frame handles the request directly. The instruction frame caches fetched and decoded instructions and may be inserted at the first access to a corresponding instruction memory frame. The instruction frame can track write accesses to instruction memory so that changes to the instruction memory can be reflected in the state of the instruction frame. Additional check frames may be chained between the interface and the memory frame to handle breakpoints, instruction memory watches or other access checks on the instruction memory frame.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: October 4, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Ronald L. Rockhold
  • Patent number: 9454785
    Abstract: Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, automatically tag and group those clustered data structures, and provide results of the automated analysis and grouping in an optimized way to an analyst. The automated analysis of the clustered data structures (also referred to herein as data clusters) may include an automated application of various criteria, rules, indicators, or scenarios so as to generate scores, reports, alerts, or conclusions that the analyst may quickly and efficiently use to evaluate the groups of data clusters.
    Type: Grant
    Filed: September 17, 2015
    Date of Patent: September 27, 2016
    Assignee: Palantir Technologies Inc.
    Inventors: Sean Hunter, Aditya Kumar, Jacob Albertson
  • Patent number: 9432368
    Abstract: A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document terms provide biometric data in the form of an ocular image. In one implementation, such rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an electronic signature is acquired from the document recipient, along with the required ocular image. The image is acquired using an infrared-enabled camera in the case of an iris image, or a retinal scanner in the case of a retina image. The acquired image can be authenticated by comparison to a trusted reference image, for example which may have been obtained from the document recipient during an initial registration process. If the comparison matches with a sufficiently high degree of confidence, then the electronic signature is considered authentic.
    Type: Grant
    Filed: February 19, 2015
    Date of Patent: August 30, 2016
    Assignee: ADOBE SYSTEMS INCORPORATED
    Inventors: Neha Saxena, Divij Kumar, Aditya Kumar Pandey
  • Publication number: 20160248765
    Abstract: A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document terms provide biometric data in the form of an ocular image. In one implementation, such rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an electronic signature is acquired from the document recipient, along with the required ocular image. The image is acquired using an infrared-enabled camera in the case of an iris image, or a retinal scanner in the case of a retina image. The acquired image can be authenticated by comparison to a trusted reference image, for example which may have been obtained from the document recipient during an initial registration process. If the comparison matches with a sufficiently high degree of confidence, then the electronic signature is considered authentic.
    Type: Application
    Filed: February 19, 2015
    Publication date: August 25, 2016
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventors: Neha Saxena, Divij Kumar, Aditya Kumar Pandey
  • Patent number: 9407526
    Abstract: In general, techniques are described to dynamically refresh a timer for a communication session provided by a bidirectional forwarding detection (BFD) protocol. The techniques potentially mitigate network load by reducing the number of BFD packets required to maintain a BFD communication session. An example network device includes a memory, programmable processor(s), a network interface, and a control unit configured to establish a BFD communication session between the network device and a peer network device that is communicatively coupled to the network device via the network interface, determine whether a packet associated with a communication session other than the BFD communication session is a relevant packet to the BFD communication session, and in response to determining that the packet is the relevant packet, refresh a timer that executes on the network device and is associated with the BFD communication session.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: August 2, 2016
    Assignee: Juniper Networks, Inc.
    Inventors: Meher Aditya Kumar Addepalli, Prashant Singh
  • Patent number: 9382848
    Abstract: In accordance with one aspect of the present technique, a method is disclosed. The method includes modifying one or more operational parameters of a gas turbine (GT) to increase an exhaust gas temperature above a standard start-up temperature. The method also includes receiving at least one of GT operational data, heat recovery steam generator (HRSG) operational data, and steam turbine (ST) operational data from a plurality of sensors. The method further includes predicting a ST roll-off time based on at least one of the GT operational data, the HRSG operational data, and the ST operational data. The method further includes modifying the one or more operational parameters of the GT to satisfy one or more ST roll-off permissives at the predicted ST roll-off time.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: July 5, 2016
    Assignee: General Electric Company
    Inventors: Fernando Javier D'Amato, Rodrigo Lopez-Negrete de la Fuente, Aditya Kumar, Emrah Biyik
  • Publication number: 20160179583
    Abstract: A method utilizes event-driven reoptimization to reallocate one or more logical partitions within a pool of logically-partitioned data processing systems in a logically-partitioned computing environment in response to detection of a system event that is likely to increase or decrease the collective resource demands of logical partitions resident in a logically-partitioned computing environment. The reoptimization may be used to consolidate logical partitions on fewer processor nodes to improve the potential for powering down hardware resources and thereby reduce power consumption.
    Type: Application
    Filed: August 27, 2015
    Publication date: June 23, 2016
    Inventors: Curtis S. Eide, Aditya Kumar, Kevin Wendzel
  • Publication number: 20160179185
    Abstract: The invention addresses these and other problems associated with the prior art by providing an apparatus and program product that utilize event-driven reoptimization to reallocate one or more logical partitions within a pool of logically-partitioned data processing systems in response to detection of a system event that is likely to increase or decrease the collective resource demands of logical partitions resident in a logically-partitioned computing environment. In some instances, for example, the reoptimization may be used to consolidate logical partitions on fewer processor nodes to improve the potential for powering down hardware resources and thereby reduce power consumption.
    Type: Application
    Filed: December 19, 2014
    Publication date: June 23, 2016
    Inventors: Curtis S. Eide, Aditya Kumar, Kevin Wendzel
  • Publication number: 20160169585
    Abstract: A cooling tower simulation system may receive a measurement from a cooling tower sensor and generate a predicted Noutput of a cooling tower system based on a model of the cooling tower system. The simulation system may generate an estimated output using an extended Kalman filter with the measurement and the predicted output as inputs, wherein the estimated output represents a characteristic of the cooling tower system.
    Type: Application
    Filed: July 25, 2013
    Publication date: June 16, 2016
    Inventors: Aditya Kumar, Brett R. Ellis, Zhaoyang Wan, Claudia C. Pierce, Mustafa Tekin Dokucu, Dongrui Wu, Sangeeta Balram
  • Publication number: 20160162618
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Application
    Filed: February 2, 2016
    Publication date: June 9, 2016
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Publication number: 20160147922
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Application
    Filed: February 2, 2016
    Publication date: May 26, 2016
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Publication number: 20160132693
    Abstract: An electronic signature comprises an authenticated audio and/or visual recording of a spoken assent that conforms to a pre-established phrase. Alternatively, an electronic signature comprises an authenticated visual recording of a series of physical gestures that conforms to a pre-established sequence. Rules are established with respect to how the assent is to be recorded and authenticated. These rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an audio and/or visual recording of the assent is generated. Location information that defines or approximates the geographical location where the document recipient recorded the assent is also optionally recorded as well. Once recorded, the assent can be authenticated using any of a variety of suitable authentication processes. An authenticated assent can be considered a legally binding electronic signature that forms a part of, or is otherwise associated with, the document.
    Type: Application
    Filed: November 6, 2014
    Publication date: May 12, 2016
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventors: Divij Kumar, Neha Saxena, Aditya Kumar Pandey, Nikhil Dang, Pulkit Jain
  • Patent number: 9336341
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Grant
    Filed: December 7, 2012
    Date of Patent: May 10, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Patent number: 9323874
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Grant
    Filed: August 18, 2015
    Date of Patent: April 26, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Patent number: 9317630
    Abstract: A simulation technique that handles accesses to a frame of instruction memory by inserting a command object between a frame proxy and a memory frame provides improved throughput in simulation environments. The instruction frame, if present, processes the access to the frame. If an instruction frame is not present for the accessed frame, the memory frame handles the request directly. The instruction frame caches fetched and decoded instructions and may be inserted at the first access to a corresponding instruction memory frame. The instruction frame can track write accesses to instruction memory so that changes to the instruction memory can be reflected in the state of the instruction frame. Additional check frames may be chained between the interface and the memory frame to handle breakpoints, instruction memory watches or other access checks on the instruction memory frame.
    Type: Grant
    Filed: December 7, 2012
    Date of Patent: April 19, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Ronald L. Rockhold
  • Patent number: 9274829
    Abstract: A mechanism is provided for handling interrupt actions for inter-thread communication. In association with a first processor thread, a thread action data structure is provided that comprises a non-blocking synchronization data structure and an internal list data structure of pending interrupts having no form of synchronization. A post of an interrupt action is received from a second processor thread to the thread action data structure associated with the first processor thread, where the interrupt action is added to the non-blocking synchronization data structure of the thread action data structure. The interrupt action is moved from the non-blocking synchronization data structure to the internal list data structure of pending interrupts for handling by the first processor thread. The internal list data structure of pending interrupts is processed to thereby handle interrupt actions moved to the internal list data structure.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Andrew J. Declercq, Ahmed Gheith, Aditya Kumar