Patents by Inventor Aditya Kumar

Aditya Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160248765
    Abstract: A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document terms provide biometric data in the form of an ocular image. In one implementation, such rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an electronic signature is acquired from the document recipient, along with the required ocular image. The image is acquired using an infrared-enabled camera in the case of an iris image, or a retinal scanner in the case of a retina image. The acquired image can be authenticated by comparison to a trusted reference image, for example which may have been obtained from the document recipient during an initial registration process. If the comparison matches with a sufficiently high degree of confidence, then the electronic signature is considered authentic.
    Type: Application
    Filed: February 19, 2015
    Publication date: August 25, 2016
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventors: Neha Saxena, Divij Kumar, Aditya Kumar Pandey
  • Patent number: 9407526
    Abstract: In general, techniques are described to dynamically refresh a timer for a communication session provided by a bidirectional forwarding detection (BFD) protocol. The techniques potentially mitigate network load by reducing the number of BFD packets required to maintain a BFD communication session. An example network device includes a memory, programmable processor(s), a network interface, and a control unit configured to establish a BFD communication session between the network device and a peer network device that is communicatively coupled to the network device via the network interface, determine whether a packet associated with a communication session other than the BFD communication session is a relevant packet to the BFD communication session, and in response to determining that the packet is the relevant packet, refresh a timer that executes on the network device and is associated with the BFD communication session.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: August 2, 2016
    Assignee: Juniper Networks, Inc.
    Inventors: Meher Aditya Kumar Addepalli, Prashant Singh
  • Patent number: 9382848
    Abstract: In accordance with one aspect of the present technique, a method is disclosed. The method includes modifying one or more operational parameters of a gas turbine (GT) to increase an exhaust gas temperature above a standard start-up temperature. The method also includes receiving at least one of GT operational data, heat recovery steam generator (HRSG) operational data, and steam turbine (ST) operational data from a plurality of sensors. The method further includes predicting a ST roll-off time based on at least one of the GT operational data, the HRSG operational data, and the ST operational data. The method further includes modifying the one or more operational parameters of the GT to satisfy one or more ST roll-off permissives at the predicted ST roll-off time.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: July 5, 2016
    Assignee: General Electric Company
    Inventors: Fernando Javier D'Amato, Rodrigo Lopez-Negrete de la Fuente, Aditya Kumar, Emrah Biyik
  • Publication number: 20160179583
    Abstract: A method utilizes event-driven reoptimization to reallocate one or more logical partitions within a pool of logically-partitioned data processing systems in a logically-partitioned computing environment in response to detection of a system event that is likely to increase or decrease the collective resource demands of logical partitions resident in a logically-partitioned computing environment. The reoptimization may be used to consolidate logical partitions on fewer processor nodes to improve the potential for powering down hardware resources and thereby reduce power consumption.
    Type: Application
    Filed: August 27, 2015
    Publication date: June 23, 2016
    Inventors: Curtis S. Eide, Aditya Kumar, Kevin Wendzel
  • Publication number: 20160179185
    Abstract: The invention addresses these and other problems associated with the prior art by providing an apparatus and program product that utilize event-driven reoptimization to reallocate one or more logical partitions within a pool of logically-partitioned data processing systems in response to detection of a system event that is likely to increase or decrease the collective resource demands of logical partitions resident in a logically-partitioned computing environment. In some instances, for example, the reoptimization may be used to consolidate logical partitions on fewer processor nodes to improve the potential for powering down hardware resources and thereby reduce power consumption.
    Type: Application
    Filed: December 19, 2014
    Publication date: June 23, 2016
    Inventors: Curtis S. Eide, Aditya Kumar, Kevin Wendzel
  • Publication number: 20160169585
    Abstract: A cooling tower simulation system may receive a measurement from a cooling tower sensor and generate a predicted Noutput of a cooling tower system based on a model of the cooling tower system. The simulation system may generate an estimated output using an extended Kalman filter with the measurement and the predicted output as inputs, wherein the estimated output represents a characteristic of the cooling tower system.
    Type: Application
    Filed: July 25, 2013
    Publication date: June 16, 2016
    Inventors: Aditya Kumar, Brett R. Ellis, Zhaoyang Wan, Claudia C. Pierce, Mustafa Tekin Dokucu, Dongrui Wu, Sangeeta Balram
  • Publication number: 20160162618
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Application
    Filed: February 2, 2016
    Publication date: June 9, 2016
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Publication number: 20160147922
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Application
    Filed: February 2, 2016
    Publication date: May 26, 2016
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Publication number: 20160132693
    Abstract: An electronic signature comprises an authenticated audio and/or visual recording of a spoken assent that conforms to a pre-established phrase. Alternatively, an electronic signature comprises an authenticated visual recording of a series of physical gestures that conforms to a pre-established sequence. Rules are established with respect to how the assent is to be recorded and authenticated. These rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an audio and/or visual recording of the assent is generated. Location information that defines or approximates the geographical location where the document recipient recorded the assent is also optionally recorded as well. Once recorded, the assent can be authenticated using any of a variety of suitable authentication processes. An authenticated assent can be considered a legally binding electronic signature that forms a part of, or is otherwise associated with, the document.
    Type: Application
    Filed: November 6, 2014
    Publication date: May 12, 2016
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventors: Divij Kumar, Neha Saxena, Aditya Kumar Pandey, Nikhil Dang, Pulkit Jain
  • Patent number: 9336341
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Grant
    Filed: December 7, 2012
    Date of Patent: May 10, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Patent number: 9323874
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Grant
    Filed: August 18, 2015
    Date of Patent: April 26, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Patent number: 9317630
    Abstract: A simulation technique that handles accesses to a frame of instruction memory by inserting a command object between a frame proxy and a memory frame provides improved throughput in simulation environments. The instruction frame, if present, processes the access to the frame. If an instruction frame is not present for the accessed frame, the memory frame handles the request directly. The instruction frame caches fetched and decoded instructions and may be inserted at the first access to a corresponding instruction memory frame. The instruction frame can track write accesses to instruction memory so that changes to the instruction memory can be reflected in the state of the instruction frame. Additional check frames may be chained between the interface and the memory frame to handle breakpoints, instruction memory watches or other access checks on the instruction memory frame.
    Type: Grant
    Filed: December 7, 2012
    Date of Patent: April 19, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Ronald L. Rockhold
  • Patent number: 9274829
    Abstract: A mechanism is provided for handling interrupt actions for inter-thread communication. In association with a first processor thread, a thread action data structure is provided that comprises a non-blocking synchronization data structure and an internal list data structure of pending interrupts having no form of synchronization. A post of an interrupt action is received from a second processor thread to the thread action data structure associated with the first processor thread, where the interrupt action is added to the non-blocking synchronization data structure of the thread action data structure. The interrupt action is moved from the non-blocking synchronization data structure to the internal list data structure of pending interrupts for handling by the first processor thread. The internal list data structure of pending interrupts is processed to thereby handle interrupt actions moved to the internal list data structure.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Andrew J. Declercq, Ahmed Gheith, Aditya Kumar
  • Patent number: 9258234
    Abstract: In general, techniques are described to dynamically adjust a session detection time defined by a timer in accordance with a bidirectional forwarding detection (BFD) protocol. The techniques utilize existing hardware and BFD software infrastructure. An example network device includes a memory, programmable processor(s), and a control unit configured to execute a timer, receive one or more packets provided by the BFD protocol, detect, based on the received one or more packets, a congestion condition associated with a link via which the network device is coupled to a network, adjust, based on the detected congestion condition, a session detection time defined by the timer, and in response to a failure to receive a packet provided by the BFD protocol within the session detection time defined by the timer, detect a failure associated with the link.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: February 9, 2016
    Assignee: Juniper Networks, Inc.
    Inventors: Meher Aditya Kumar Addepalli, Prashant Singh
  • Patent number: 9256461
    Abstract: A mechanism is provided for handling interrupt actions for inter-thread communication. In association with a first processor thread, a thread action data structure is provided that comprises a non-blocking synchronization data structure and an internal list data structure of pending interrupts having no form of synchronization. A post of an interrupt action is received from a second processor thread to the thread action data structure associated with the first processor thread, where the interrupt action is added to the non-blocking synchronization data structure of the thread action data structure. The interrupt action is moved from the non-blocking synchronization data structure to the internal list data structure of pending interrupts for handling by the first processor thread. The internal list data structure of pending interrupts is processed to thereby handle interrupt actions moved to the internal list data structure.
    Type: Grant
    Filed: September 18, 2013
    Date of Patent: February 9, 2016
    Assignee: International Business Machines Corporation
    Inventors: Andrew J. Declercq, Ahmed Gheith, Aditya Kumar
  • Publication number: 20160032623
    Abstract: An electronic locking mechanism has a body portion with movable retaining members that are controlled utilizing an electrically controlled actuator. The actuator operates the retaining member to move radially outwardly of the body portion circumference in a locked position and allows the retaining member to move radially inwardly of the circumference in an unlocked position. An electronic key can be utilized to operate the electronic locking mechanism.
    Type: Application
    Filed: March 15, 2013
    Publication date: February 4, 2016
    Inventors: Norman Binz DeWalch, Tyler Dean Todd, Aditya Kumar Palthi
  • Publication number: 20150356221
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Application
    Filed: August 18, 2015
    Publication date: December 10, 2015
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Publication number: 20150330866
    Abstract: A system and method for monitoring operating conditions of tubes in a steam generator. The system comprises sensors, affixed to the tubes, for detecting one or more of mechanical strains, pressures, and temperatures in the tubes; or a camera positioned in the steam generator, the camera for capturing thermal images of the tubes; or both the sensors and the camera. The system also comprises one or more computers connected to the sensors, or the camera, or both the sensors and the camera, the computers for receiving one or more of the mechanical strains, pressures, temperatures, and thermal images, and monitoring the operating conditions of the tubes. The method comprises receiving, at one or more times, one or more of pressures, mechanical strains, temperatures, and infrared photon counts of the tubes; identifying segments of the tubes to which pertains the pressures, mechanical strains, temperatures, and infrared photon counts; and monitoring the operating conditions of the tubes.
    Type: Application
    Filed: December 20, 2013
    Publication date: November 19, 2015
    Inventors: Xingwei YANG, Aditya KUMAR, Ali CAN, Guanghua WANG
  • Publication number: 20150323563
    Abstract: The present invention relates to an apparatus and method for securing a box cover to a watthour meter socket box and relates to an apparatus, a system including a ring and fracturable locking system, in some embodiments, and method for securing a watthour electrical meter to a socket meter box. A locking sealing ring comprises an annular band, wherein a body portion of the annular band comprises a first band portion and a second band portion, and wherein the first band portion comprises a first ring end and the second band portion comprises a second ring end. A first tab is disposed on the first ring end and comprises a connector member. A second tab is disposed on the second ring end with the second tab comprising a receiver member, and wherein the connector member is adapted for connection with the receiver member.
    Type: Application
    Filed: January 27, 2013
    Publication date: November 12, 2015
    Applicant: DeWalch Technologies, Inc.
    Inventors: Tyler Dean, II Todd, Aditya Kumar Palthi, Donald Mark DeWalch, James Michael Holcomb
  • Publication number: 20150319198
    Abstract: Techniques are disclosed for making an electronic document easier to use based on prior interactions with the same or a similar document by other users. An electronic document is presented to one or more users in an interactive environment. Interactions between the users and the document can be recorded as usage data. The usage data may represent one or more operations performed on the electronic document by the users. Based on the usage data, an enhanced user interaction feature associated with the document is configured. The electronic document and the enhanced user interaction feature are then presented to another user in another interactive environment. The enhanced user interaction feature makes using the document easier than it would be if the feature was not present, particularly for users who are unfamiliar with the document.
    Type: Application
    Filed: May 5, 2014
    Publication date: November 5, 2015
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventors: Yash Kumar Gupta, Lalit Vohra, Abhishek Modi, Aditya Kumar Pandey, Ankit Pangasa, Frederic Thevenet, Kirk B. Gould, Mohit Bansal, Nishant Kaushik, David Sherry, Steve Dakin, Vishal K. Gupta