Patents by Inventor Ajay Mittal

Ajay Mittal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240406231
    Abstract: A data processing system implements a hybrid environment for interactions between remote and in-person users. The data processing techniques provide tools for facilitating mingling of remote and in-person users in semi-structured interaction, such as but not limited to tradeshows or conferences, and unstructured interactions, such as but not limited to social gatherings that solve the technical problems associated with enabling such systems. The data processing system implements audio porosity and map-based navigation to facilitate improved spatial awareness and awareness of the presence of other remote or in-person users nearby with whom the user can interact.
    Type: Application
    Filed: July 25, 2023
    Publication date: December 5, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Venkata N. PADMANABHAN, Ajay MANCHEPALLI, Harsh VIJAY, Sirish GAMBHIRA, Amish MITTAL, Saumay PUSHP, Praveen GUPTA, Mayank BARANWAL, Shivang CHOPRA, Meghna GUPTA, Arshia ARYA
  • Patent number: 12118019
    Abstract: A smart data signals platform for artificial intelligence/machine learning (AI/ML)-based modeling and simulation is structured to pre-process input data by structuring previously unstructured data that relates to a structured data item and linking the structured data to the data item to generate a validated enriched dataset. The validated enriched dataset is used to generate a trigger signal by evaluating at least an aspect to the enriched dataset against at least one criterion that corresponds to a loss hypothesis. The trigger signal is used to automatically monitor subsequently received structured data, access corresponding unstructured data and generate an analysis dataset for one or more machine learning models. The one or more machine learning models generate a computer-based prediction based on the analysis dataset. The prediction can include a resource degradation indicator.
    Type: Grant
    Filed: November 29, 2023
    Date of Patent: October 15, 2024
    Assignee: ExlService Holdings, Inc.
    Inventors: Lopamudra Panda, Sumit Taneja, Sumit Agarwal, Rashmi Ashrafi, Mustafa Karmalawala, Saurabh Mittal, Subodh Baranwal, Gregory Tyler Freeman, Shailesh Giri, Anurag Arora, Ajay Tiwari
  • Publication number: 20240338386
    Abstract: A smart data signals platform for artificial intelligence/machine learning (AI/ML)-based modeling and simulation is structured to pre-process input data by structuring previously unstructured data that relates to a structured data item and linking the structured data to the data item to generate a validated enriched dataset. The validated enriched dataset is used to generate a trigger signal by evaluating at least an aspect to the enriched dataset against at least one criterion that corresponds to a loss hypothesis. The trigger signal is used to automatically monitor subsequently received structured data, access corresponding unstructured data and generate an analysis dataset for one or more machine learning models. The one or more machine learning models generate a computer-based prediction based on the analysis dataset. The prediction can include a resource degradation indicator.
    Type: Application
    Filed: November 29, 2023
    Publication date: October 10, 2024
    Inventors: Lopamudra Panda, Sumit Taneja, Sumit Agarwal, Rashmi Ashrafi, Mustafa Karmalawala, Saurabh Mittal, Subodh Baranwal, Gregory Tyler Freeman, Shailesh Giri, Anurag Arora, Ajay Tiwari
  • Publication number: 20240272875
    Abstract: A method and a system for providing a framework of configurable components, services, and modules that are reusable for construction of complex workflow applications in order to reduce volume and redundancy in manual coding requirements are provided. The method includes: receiving user criteria that relate to a task to be performed by executing the application to be constructed; analyzing each of the criteria; identifying, based on a result of the analysis, component software modules that are usable for satisfying some of the criteria; and transmitting information that relates to constructing the application by using the identified component software modules to the user.
    Type: Application
    Filed: March 28, 2023
    Publication date: August 15, 2024
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: Shashanka NARAYAN, Uday PANT, Donald CONTE, Debayan SAMANTA, Prabhleen KAUR, Ajay BHARADWAJ, Rahul MITTAL, Vivek PRAKASH, Daniel HALVERSON, Srivamshikanth ADDE
  • Publication number: 20100222053
    Abstract: An arrangement for managing a telecommunication session for a plurality of mobile communication devices that includes at least a first mobile communication device and a second mobile communication device is provided. The arrangement includes a mobility gateway, which is configured to communicate with the mobility client software of the first mobile communication device, wherein the first mobile communication device is a subscriber of the mobility gateway. The mobility gateway includes computer readable code implementing a model configured for collecting and storing environmental data about a set of access points. The environmental data includes data collected during the telecommunication session between the first mobile communication device and the second mobile communication device. The environmental data also includes data collected during previous telecommunication sessions supported by the mobility gateway.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: AthuluruTirumala GiriSrinivasaRao, Ajay Mittal, Marc Solsona-Palomar
  • Publication number: 20090215438
    Abstract: A method for facilitating wireless communication of a client device with a destination telecommunication device is provided. The method includes receiving a first telecommunication signal from the client device by a server managed by an enterprise. The method also includes analyzing the first telecommunication signal to determine if a less expensive telecommunication option is available. The method further includes, the server sending a callback signal to the client device if the less expensive telecommunication option is available. The method yet also includes accepting the callback signal via a non-human initiated response by the client device, thereby establishing a telecommunication connection between the client device and the server. The method yet further includes sending a second telecommunication signal by the server to the destination telecommunication device.
    Type: Application
    Filed: February 23, 2008
    Publication date: August 27, 2009
    Inventors: Ajay Mittal, Prasad Rao, Srinivasa Athuluru, Rajesh Palakkal, Josh Marder, Varad Seshadri, Marc Solsona-Palomar, Derek Wang
  • Patent number: 7480500
    Abstract: A mobility architectural arrangement for managing telecommunication mobility for a handset is provided. The arrangement includes a DiVitas protocol proxy (DPP), which is configured to manage connectivity between a mobility client of the handset and a mobility server within an enterprise. The DPP includes a client DPP being configured to manage the connectivity for the mobility client of the handset. The client DPP receives a plurality of client connectivity requests from a plurality of application clients. The server DPP is configured to manage the connectivity for the mobility server. The server DPP receives a plurality of server connectivity requests from a plurality of application servers. The client DPP and the server DPP are configured to interact with one another to establish a secure channel.
    Type: Grant
    Filed: May 30, 2007
    Date of Patent: January 20, 2009
    Assignee: Divitas Networks, Inc.
    Inventor: Ajay Mittal
  • Publication number: 20080140767
    Abstract: A mobility architectural arrangement, which includes a set of software modules, is provided. A subset of the set of software modules implements a DiVitas description protocol (DDP), which is configured to transport data packets between applications clients on a handset and application servers within an enterprise. The set of modules includes a client DDP, which is configured to be loaded onto a mobility client of the handset. The client DDP is configured to perform at least one of sending the data packets from a first application client and receiving the data packets from a first application server. The set of modules includes a server DDP, which is configured to he loaded onto a mobility server managed by the enterprise. The server DDP is configured to perform at least one of sending the data packets from the first application server and receiving the data packets from the first application client.
    Type: Application
    Filed: May 30, 2007
    Publication date: June 12, 2008
    Inventors: Prasad Rao, Rajesh Palakkal, Joshua Marder, Ajay Mittal, Marc Solsona-Palomar, Snehal Karia
  • Publication number: 20080119165
    Abstract: A computer-implemented method for authenticating a cellular recipient to facilitate a call from a first caller's first communication device to a cellular recipient's cellular telephone is provided. The first caller dials an enterprise extension number and a server employs a cellular telephone number associated with cellular telephone to attempt to direct the call to cellular telephone in a public cellular network. The method includes initiating, prior to completing an end-to-end bearer channel between first communication device and cellular telephone, an authentication period having a finite duration. The method also includes receiving first authentication data from cellular telephone. If first authentication data matches, during the authentication period, with second authentication data that is pre-arranged with the server, completing the end-to-end bearer channel between first communication device and cellular telephone.
    Type: Application
    Filed: October 2, 2006
    Publication date: May 22, 2008
    Inventors: Ajay Mittal, Snehal Karia, Srinivasa Athuluru
  • Patent number: 7336773
    Abstract: Enabling control over multiple forms of communication to a recipient, such as email, instant messages, cell phone calls, conventional phone calls, faxes, and the like. The recipient defines rules for authenticating senders and for determining when, where, and how communication from the senders is transmitted to the recipient's preferred receiving device(s). The rules are stored in a database of a central service. The central service applies the rules to incoming email, instant messages, calls, faxes, etc. The central service screens unauthentic senders according the recipients rules associated with each form of communication, requiring the sender to provide some proof of identification. If authenticated, the central service enables a sender to communicate with the recipient via the recipient's currently preferred receiving device.
    Type: Grant
    Filed: July 21, 2004
    Date of Patent: February 26, 2008
    Assignee: Nokia, Inc.
    Inventor: Ajay Mittal
  • Publication number: 20070094374
    Abstract: A system for facilitating wireless communication. The system includes a client device configured to operate in a plurality of networks. The system also includes a server coupled to the plurality of networks and managed by an enterprise. The server is configured to store connectivity information of the client device, to route incoming media data addressed to the client device using the connectivity information of the client device, and to route outgoing media data originated from the client device through the server. The connectivity information pertains to connectivity of the client device with at least one network of the plurality of networks.
    Type: Application
    Filed: October 2, 2006
    Publication date: April 26, 2007
    Inventors: Snehal Karia, Ajay Mittal, Prasad Rao, Srinivasa Athuluru, Rajesh Palakkal, Josh Marder, Varad Seshadri, Marc Solsona-Palomar, Derek Wang
  • Publication number: 20070091848
    Abstract: A method for reducing data loss when a client device performs a handoff from a first radio station to a second radio station. The method includes detecting imminence of the handoff using one or more criteria. The method also includes buffering incoming data upon the imminence of the handoff to generate buffered incoming data, the incoming data being addressed to the client device. The method further includes transmitting the buffered incoming data to the client device through the second radio station if the handoff is completed and if the buffered incoming data is not discarded.
    Type: Application
    Filed: October 2, 2006
    Publication date: April 26, 2007
    Inventors: Snehal Karia, Derek Wang, Srinivasa Athuluru, Rajesh Palakkal, Marc Solsona-Palomar, Ajay Mittal, Prasad Rao, Varad Seshadri, Josh Marder
  • Patent number: 7076645
    Abstract: The present invention is directed at rebooting a cluster while maintaining cluster operation. Cluster operation is automatically maintained during the reboot since at least one member of the cluster stays active during the process. An administrator triggers the reboot process and then does not have to perform any other steps during the reboot process. An algorithm executes which reboots members of the cluster at different times, while always maintaining operation of at least one member of the cluster.
    Type: Grant
    Filed: June 25, 2003
    Date of Patent: July 11, 2006
    Assignee: Nokia Inc.
    Inventors: Ajay Mittal, Laura Xu, Srikanth Koneru
  • Publication number: 20060018445
    Abstract: Enabling control over multiple forms of communication to a recipient, such as email, instant messages, cell phone calls, conventional phone calls, faxes, and the like. The recipient defines rules for authenticating senders and for determining when, where, and how communication from the senders is transmitted to the recipient's preferred receiving device(s). The rules are stored in a database of a central service. The central service applies the rules to incoming email, instant messages, calls, faxes, etc. The central service screens unauthentic senders according the recipients rules associated with each form of communication, requiring the sender to provide some proof of identification. If authenticated, the central service enables a sender to communicate with the recipient via the recipient's currently preferred receiving device.
    Type: Application
    Filed: July 21, 2004
    Publication date: January 26, 2006
    Applicant: Nokia Inc.
    Inventor: Ajay Mittal
  • Publication number: 20050010752
    Abstract: A system and method is directed to detecting tampering of a computer system's operating system (OS). The OS includes a kernel binary and at least one user level binary. When the user level binary is generated, selected integrity data is also generated. Such integrity data may include, but is not limited to, a digital signature, a hash associated with the user level binary, and the like. In one embodiment, integrity data is also generated for the kernel. The kernel is modified to include the integrity data associated with the user level binary. The kernel further includes a tamper detector that is configured to examine the OS binary against its associated integrity data. If tampering is detected, the tamper detector may provide a message indicating which OS binary may have been modified. The tamper detector may also quarantine the modified OS binary, log the message, and the like.
    Type: Application
    Filed: June 23, 2003
    Publication date: January 13, 2005
    Applicant: Nokia, Inc.
    Inventors: Marc Solsona, Ajay Mittal
  • Publication number: 20040268112
    Abstract: The present invention is directed at rebooting a cluster while maintaining cluster operation. Cluster operation is automatically maintained during the reboot since at least one member of the cluster stays active during the process. An administrator triggers the reboot process and then does not have to perform any other steps during the reboot process. An algorithm executes which reboots members of the cluster at different times, while always maintaining operation of at least one member of the cluster.
    Type: Application
    Filed: June 25, 2003
    Publication date: December 30, 2004
    Applicant: NOKIA INC.
    Inventors: Ajay Mittal, Laura Xu, Srikanth Koneru
  • Publication number: 20040267910
    Abstract: The present invention provides cluster management from a single application. A user may perform management tasks on all of the devices within the cluster using a GUI or a CLI. The system automatically discovers the members of the cluster and acquires a configuration lock on the devices preventing other users from performing conflicting operations. If a problem occurs during a configuration, the devices may be rolled back to a previous working configuration. A message format is provided to help ensure message integrity beyond the security provided by a secure transport. An aggregator aggregates configuration information and motored data and allows the information to be presented according to a user's requirements.
    Type: Application
    Filed: June 24, 2003
    Publication date: December 30, 2004
    Applicant: NOKIA INC.
    Inventors: Basil Treppa, Ajay Mittal, Srikanth Koneru, Laura Xu, Ajay Matai
  • Publication number: 20040254990
    Abstract: A system and method is directed to providing a knock notification in response to a message from an unknown sender. The method includes maintaining a data store of message senders that an end-user has identified as an allowed sender. A received message is evaluated to determine whether its sender is an allowed sender. If the sender is an allowed sender, the received message is forwarded to the end-user. If it is determined that the sender is an unknown sender, a knock notification message is generated. In one embodiment, the knock notification message includes the information about the sender and a mechanism to enable the end-user to allow/disallow the sender. If the end-user disallows the sender, the received message is discarded. Information associated with the disallowed sender is included in a data store for disallowed senders. The end-user may review and revise the data stores of allowed and disallowed senders.
    Type: Application
    Filed: June 13, 2003
    Publication date: December 16, 2004
    Applicant: Nokia, Inc.
    Inventor: Ajay Mittal