Patents by Inventor Ajeet Kumar
Ajeet Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10691884Abstract: System and method for cheque image data masking are disclosed. In an example, a cheque image and a data file are received, the data file includes data records with values corresponding to sensitive data fields in the cheque image. Further, a template cheque image matching to the cheque image and redacted information associated with the template cheque image are obtained. Furthermore, a blank image snippet is generated for each sensitive data field in the cheque image based on a part of the obtained information about sensitive fields. Moreover, values corresponding to each sensitive field from the input data file are written to the blank image snippet based on the remaining information about sensitive fields. Also, the template cheque image is updated with the image snippet. Data of non-sensitive fields in the cheque image is then copied to the template cheque image, thereby facilitating cheque image data masking.Type: GrantFiled: March 23, 2017Date of Patent: June 23, 2020Assignee: Tata Consultancy Services LimitedInventors: Arun Kumar Jindal, Srinivasa Rao Chalamala, Ajeet Kumar Singh, Vijayanand Mahadeo Banahatti, Sachin Premsukh Lodha, Sumit Johri, Mayur Jain, Nandita Babu, Nikhil Girish Patwardhan, Ashim Roy
-
Publication number: 20200089899Abstract: Biometric templates (template) are used to store biometric data of one or more users. As biometric data of each user is unique and non-replaceable, template security is a major concern. This disclosure relates generally to template protection, and more particularly to a method and system for biometric template protection. The system generates a final perturbation value for data in the template, based on a first binary code (BC), a second binary code (BC?), feature vectors corresponding to data in the template, and an initial random perturbation. The final perturbation and the feature vectors are mapped to the first binary code. The first binary code represents the template. Every time the first binary code is compromised, the value of first binary code is updated, and the whole process is repeated to generate corresponding final perturbation and then the mapping is done.Type: ApplicationFiled: September 16, 2019Publication date: March 19, 2020Applicant: Tata Consultancy Services LimitedInventors: Santosh Kumar JAMI, Krishna Rao KAKKIRALA, Srinivasa Rao CHALAMALA, Ajeet Kumar SINGH, Arun Kumar JINDAL, Balakrishna GUDLA, Bala Mallikarjunarao GARLAPATI
-
Patent number: 10496894Abstract: System and method for text localization in images are disclosed. In an embodiment, a line and graphic eliminated image is received. Further, horizontal projection is performed on rows of the image to obtain a first flag vector, the flag vector indicates whether there is text in each row. Furthermore, a number of run-lengths of consecutive 1's and 0's is computed in the first flag vector. Moreover, text lines is extracted in the image based on the computed number of run-lengths of consecutive 1's and 0's in the first flag vector. Also, vertical projection is performed on the text lines to obtain a second flag vector for the text lines. Further, a number of run-lengths of consecutive 1's and 0's is computed in the second flag vectors. Furthermore, text is localized in the image based on the computed number of run-lengths of consecutive 1's and 0's in the second flag vectors.Type: GrantFiled: January 18, 2018Date of Patent: December 3, 2019Assignee: Tata Consultancy Services LimitedInventors: Santosh Kumar Jami, Srinivasa Rao Chalamala, Krishna Rao Kakkirala, Balakrishna Gudla, Arun Kumar Jindal, Bala Mallikarjunarao Garlapati, Sachin Premsukh Lodha, Ajeet Kumar Singh, Vijayanand Mahadeo Banahatti
-
Publication number: 20190287204Abstract: Systems and methods for insertion of a watermark into images and tampering detection of the watermarked images by a Convolutional Neural Network (CNN) technique. The traditional systems and methods provide for detecting the tampering of the watermarked images by simply identifying a presence of an inserted watermark into an image but none them provide for inserting a random sequence into input image(s) and then detect the tampering by classifying the input image(s) by a neural network.Type: ApplicationFiled: March 14, 2019Publication date: September 19, 2019Applicant: Tata Consultancy Services LimitedInventors: Krishna Rao KAKKIRALA, Srinivasa Rao CHALAMALA, Bala Mallikarjunarao GARLAPATI, Balakrishna GUDLA, Santosh Kumar JAMI, Arun Kumar JINDAL, Ajeet Kumar SINGH
-
Patent number: 10165622Abstract: The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method and an apparatus for synchronizing communication between nodes in a bluetooth low energy (BLE) mesh network. In the network, a node is configured to generates a seed value based on at least one of own transmission parameter, wherein the seed value indicates next data advertisement instance of corresponding node. Further, the seed value is used for communicating with other nodes (i.e. 1-hop neighbor nodes) in the network. Based on data transfer requirements of the node, the node synchronizes own data transmission and reception settings, such that no two nodes transmit data at the same time.Type: GrantFiled: June 3, 2016Date of Patent: December 25, 2018Assignee: Samsung Electronics Co., Ltd.Inventors: Ajeet Kumar Singh, Arzad Alam Kherani, Dae-Kyu Choi, Anand Sudhakar Chiddarwar, Sang-Jun Moon
-
Publication number: 20180285675Abstract: System and method for text localization in images are disclosed. In an embodiment, a line and graphic eliminated image is received. Further, horizontal projection is performed on rows of the image to obtain a first flag vector, the flag vector indicates whether there is text in each row. Furthermore, a number of run-lengths of consecutive 1's and 0's is computed in the first flag vector. Moreover, text lines is extracted in the image based on the computed number of run-lengths of consecutive 1's and 0's in the first flag vector. Also, vertical projection is performed on the text lines to obtain a second flag vector for the text lines. Further, a number of run-lengths of consecutive 1's and 0's is computed in the second flag vectors. Furthermore, text is localized in the image based on the computed number of run-lengths of consecutive 1's and 0's in the second flag vectors.Type: ApplicationFiled: January 18, 2018Publication date: October 4, 2018Applicant: Tata Consultancy Services LimitedInventors: Santoshkumar JAMI, Srinivasa Rao CHALAMALA, Krishna Rao KAKKIRALA, Balakrishna GUDLA, Arun Kumar JINDAL, Bala Mallikarjunarao GARLAPATI, Sachin Premsukh LODHA, Ajeet Kumar SINGH, Vijayanand Mahadeo BANAHATTI
-
Publication number: 20180113849Abstract: System and method for cheque image data masking are disclosed. In an example, a cheque image and a data file are received, the data file includes data records with values corresponding to sensitive data fields in the cheque image. Further, a template cheque image matching to the cheque image and redacted information associated with the template cheque image are obtained. Furthermore, a blank image snippet is generated for each sensitive data field in the cheque image based on a part of the obtained information about sensitive fields. Moreover, values corresponding to each sensitive field from the input data file are written to the blank image snippet based on the remaining information about sensitive fields. Also, the template cheque image is updated with the image snippet. Data of non-sensitive fields in the cheque image is then copied to the template cheque image, thereby facilitating cheque image data masking.Type: ApplicationFiled: March 23, 2017Publication date: April 26, 2018Applicant: Tata Consultancy Services LimitedInventors: Arun Kumar JINDAL, Srinivasa Rao CHALAMALA, Ajeet Kumar SINGH, Vijayanand Mahadeo BANAHATTI, Sachin Premsukh LODHA, Sumit JOHRI, Mayur JAIN, Nandita BABU, Nikhil Girish PATWARDHAN, Ashim ROY
-
Patent number: 9955425Abstract: Methods and devices may select a particular radio access technology (RATs) available on a multi-technology wireless communication device to support a user activity based on monitored device usage patterns and power consumption profiles of the various RATs. Various embodiments may enable multi-RAT wireless communication devices to monitor the usage patterns of each service (i.e., wireless communication link) provided by the device, and estimate the power consumption during the user activity based on the power needs of services and the user activity. A multi-RAT wireless communication device may determine whether switching, enabling, or disabling services and/or RATs would reduce power consumption. Thus, the wireless communication device may extend the time that a user can perform a user activity when battery reserves are low by switching to a lower-power RAT and/or disabling power-hungry services.Type: GrantFiled: October 21, 2015Date of Patent: April 24, 2018Assignee: QUALCOMM IncorporatedInventors: Sabyasachi Bhattacharya, Ajeet Kumar, Ajay Kumar Reddy Boddu
-
Publication number: 20170339265Abstract: The present application relates to service management at a user equipment (UE). The described aspects include determining whether at least one activated service satisfies a termination condition based on detecting that a service deactivation triggering condition has been met. The described aspects further include determining whether the at least one activated service was activated based on an indication received from an interface unit of the UE based on determining that the at least one activated services satisfies the termination condition. Additionally, the described aspects include terminating operation of the at least one activated service based on determining that the at least one activated service satisfies the termination condition and the at least one service was not activated by the interface unit between the application and the at least one activated service.Type: ApplicationFiled: May 20, 2016Publication date: November 23, 2017Inventors: Ajeet KUMAR, Ajay K.R. BODDU, Arun KHANNA, Sabyasachi BHATTACHARYA
-
Patent number: 9788257Abstract: A method of dynamically forming a service aware Bluetooth low energy (BLE) mesh network is provided. The method includes deriving service requirements for a BLE mesh service based on a unique identifier associated with the BLE mesh service, determining a BLE mesh service to be provided based on at least one BLE parameter, and dynamically forming a BLE mesh network based on the determined BLE mesh service, the service requirements and the at least one BLE parameter. The BLE mesh network is one of connection-oriented, or connection-less.Type: GrantFiled: March 25, 2016Date of Patent: October 10, 2017Assignee: Samsung Electronics Co., Ltd.Inventors: Ajeet Kumar Singh, Anand Sudhakar Chiddarwar, Arzad Alam Kherani, Dae-kyu Choi, Midhun K, Sushanth Gajanan, Do-jun Byun, Sang-Jun Moon
-
Publication number: 20170156102Abstract: A method of dynamically forming a service aware Bluetooth low energy (BLE) mesh network is provided. The method includes deriving service requirements for a BLE mesh service based on a unique identifier associated with the BLE mesh service, determining a BLE mesh service to be provided based on at least one BLE parameter, and dynamically forming a BLE mesh network based on the determined BLE mesh service, the service requirements and the at least one BLE parameter. The BLE mesh network is one of connection-oriented, or connection-less.Type: ApplicationFiled: March 25, 2016Publication date: June 1, 2017Inventors: Ajeet Kumar SINGH, Anand Sudhakar CHIDDARWAR, Arzad Alam KHERANI, Dae-kyu CHOI, Midhun K, Sushanth GAJANAN, Do-jun BYUN, Sang-Jun MOON
-
Publication number: 20170118715Abstract: Methods and devices may select a particular radio access technology (RATs) available on a multi-technology wireless communication device to support a user activity based on monitored device usage patterns and power consumption profiles of the various RATs. Various embodiments may enable multi-RAT wireless communication devices to monitor the usage patterns of each service (i.e., wireless communication link) provided by the device, and estimate the power consumption during the user activity based on the power needs of services and the user activity. A multi-RAT wireless communication device may determine whether switching, enabling, or disabling services and/or RATs would reduce power consumption. Thus, the wireless communication device may extend the time that a user can perform a user activity when battery reserves are low by switching to a lower-power RAT and/or disabling power-hungry services.Type: ApplicationFiled: October 21, 2015Publication date: April 27, 2017Inventors: Sabyasachi Bhattacharya, Ajeet Kumar, Ajay Kumar Reddy Boddu
-
Publication number: 20170070894Abstract: Systems and methods are described herein for performing thermal mitigation in a mobile communication device having a first subscription and a second subscription. The method includes, but not limited to, determining whether the mobile communication device has reached a first thermal level in which only circuit switching services are available, detecting that the second subscription is out of service in response to determining that the mobile communication device has reached the first thermal level, determining whether a current temperature exceeds, beyond a threshold, a temperature at a time of a previous scan for an available network for the second subscription, and waiting a first period of time before scanning for the available network for the second subscription, in response to determining that the current temperature exceeds, beyond the threshold, the temperature at the time of the previous scan.Type: ApplicationFiled: September 4, 2015Publication date: March 9, 2017Inventors: Ajeet Kumar, Ajay K. R. Boddu, Arun Khanna, Sabyasachi Bhattacharya
-
Publication number: 20160366642Abstract: The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method and an apparatus for synchronizing communication between nodes in a bluetooth low energy (BLE) mesh network. In the network, a node is configured to generates a seed value based on at least one of own transmission parameter, wherein the seed value indicates next data advertisement instance of corresponding node. Further, the seed value is used for communicating with other nodes (i.e. 1-hop neighbor nodes) in the network. Based on data transfer requirements of the node, the node synchronizes own data transmission and reception settings, such that no two nodes transmit data at the same time.Type: ApplicationFiled: June 3, 2016Publication date: December 15, 2016Inventors: Ajeet Kumar SINGH, Arzad Alam KHERANI, Dae-Kyu CHOI, Anand Sudhakar CHIDDARWAR, Sang-Jun MOON
-
Patent number: 9445385Abstract: Methods and devices are disclosed for enabling efficient network registration using a shared radio resource for at least a first and second SIM of a multi-SIM wireless communication device. An overall priority-based ranking may be calculated for each SIM of the multi-SIM device, which may be used to determine an preferred order for the SIMs to register for services in their respective networks. Calculating the overall priority-based ranking for each SIM may include determining values for a service capability priority factor, an attachment time factor, and a sleep cycle duration factor.Type: GrantFiled: February 25, 2014Date of Patent: September 13, 2016Assignee: QUALCOMM IncorporatedInventors: Shivank Nayak, Ajeet Kumar, Rajesh Madhukar Patil
-
Patent number: 9307512Abstract: Methods and devices are disclosed for enabling efficient network registration using a shared radio resource for at least a first and second SIM of a multi-SIM wireless communication device. After the end of a radio-off condition of the radio resource, the wireless device may identify services supported by each of the first and second SIMs, evaluate criticality of the supported services, determine which of the first and second SIM supports the service having the highest criticality, and prevent the other SIM from registering with its network before the SIM with the service of the highest criticality has successfully registered for service in its selected network.Type: GrantFiled: April 7, 2014Date of Patent: April 5, 2016Assignee: QUALCOMM IncorporatedInventors: Shivank Nayak, Ajeet Kumar, Shilpa Nagpal, Rajesh Madhukar Patil, Venugopal Krishna Srinivasa Srungaram, Ravi Kanth Kotreka
-
Publication number: 20160012070Abstract: A method, non-transitory computer readable medium, and device that manages requests to list previous versions of an object includes receiving a previous version listing request including an object path for an object. The presence of the junction point within the received previous version listing request is determined. The junction point is resolved to identify a snapshot directory when the received previous version listing request is determined to include the junction point. A plurality of object entries present within the identified snapshot directory is provided as previous versions of the object to a requesting client computing device.Type: ApplicationFiled: July 8, 2014Publication date: January 14, 2016Inventors: Amit Aggarwal, Ajeet Kumar
-
Publication number: 20150289221Abstract: Methods and devices are disclosed for enabling efficient network registration using a shared radio resource for at least a first and second SIM of a multi-SIM wireless communication device. After the end of a radio-off condition of the radio resource, the wireless device may identify services supported by each of the first and second SIMs, evaluate criticality of the supported services, determine which of the first and second SIM supports the service having the highest criticality, and prevent the other SIM from registering with its network before the SIM with the service of the highest criticality has successfully registered for service in its selected network.Type: ApplicationFiled: April 7, 2014Publication date: October 8, 2015Applicant: Qualcomm IncorporatedInventors: Shivank Nayak, Ajeet Kumar, Shilpa Nagpal, Rajesh Madhukar Patil, Venugopal Krishna Srinivasa Srungaram, Ravi Kanth Kotreka
-
Publication number: 20150288792Abstract: A method of providing thermal mitigation for a mobile device includes: receiving at least one temperature signal indicative of at least one operating temperature of the mobile device; comparing the at least one temperature signal to a plurality of progressively higher temperature thresholds; and selecting one of a plurality of thermal mitigation plans based on one of a plurality of mobile device operating modes and the comparison of the at least one temperature signal with the plurality of temperature thresholdsType: ApplicationFiled: April 7, 2014Publication date: October 8, 2015Applicant: QUALCOMM INCORPORATEDInventors: Shivank Nayak, Shilpa Nagpal, Ajeet Kumar
-
Publication number: 20150245309Abstract: Methods and devices are disclosed for enabling efficient network registration using a shared radio resource for at least a first and second SIM of a multi-SIM wireless communication device. An overall priority-based ranking may be calculated for each SIM of the multi-SIM device, which may be used to determine an preferred order for the SIMs to register for services in their respective networks. Calculating the overall priority-based ranking for each SIM may include determining values for a service capability priority factor, an attachment time factor, and a sleep cycle duration factor.Type: ApplicationFiled: February 25, 2014Publication date: August 27, 2015Applicant: QUALCOMM IncorporatedInventors: Shivank Nayak, Ajeet Kumar, Rajesh Madhukar Patil