Patents by Inventor Ajith Kumar
Ajith Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250130708Abstract: Described herein are systems and methods for securely sharing content between applications. In an example, trusted application can include a plug-in for a secure container that securely stores content. When a user drags content from an application to the plug-in, the secure container stores the content in a secure location that is inaccessible to other applications or services. A user can view and share content stored in the secure container at other trusted applications via the plug-in. In another example, a user can drag and drop content directly from a first application to a second application. The second application can provide the first application with a public encryption key that the first application can use to encrypt the content. After the content is dropped at the second application, the first application can send the content to the second application and the second application can decrypt the content.Type: ApplicationFiled: March 15, 2024Publication date: April 24, 2025Inventors: AJITH KUMAR VELUTHERI, MADHAVAN KARA BHATTATHIRI
-
Patent number: 12282419Abstract: According to some embodiments, systems and methods are provided, including a memory storing processor-executable code; and a processing unit to execute the executable program code to: execute an automation test for a user interface application, wherein execution of the automation test includes accessing a web-object; determine whether the web-object is included in an object repository; in a case it is determined the web-object is not included in the object repository, create the web-object in the object repository; and in a case it is determined the web-object is included in the object repository: determine whether the accessed web-object includes at least one different property from the web-object included in the object repository; and update the web-object included in the object repository with the at least one different property in the accessed web-object. Numerous other aspects are provided.Type: GrantFiled: May 31, 2022Date of Patent: April 22, 2025Assignee: SAP SEInventors: Naveen V, Shanavas Madeen S, Ravikanth Malipeddu, Santhosh Reddy Mereddy, Ajith G, Prabhat Kumar Singh, Sushanth B R, Manu Jose Philip
-
Patent number: 12192822Abstract: A method for communication by a source general packet radio service tunnelling protocol user (GTP-U) node in a wireless network is provided. The method includes receiving at least one data packet from at least one user equipment (UE), determining whether the at least one received data packet is at least one guaranteed bit rate (GBR) data packet or at least one non-GBR data packet, if the at least one received data packet is the at least one GBR data packet, transmitting the at least one received GBR data packet to at least one target GTP-U node, if the at least one received data packet is the at least one non-GBR data packet, storing the at least one received non-GBR data packet into a buffer before transmitting to the at least one target GTP-U node, and transmitting the at least one received non-GBR data packet to the at least one target GTP-U node based on a maximum segment size (MSS) of the buffer.Type: GrantFiled: April 14, 2022Date of Patent: January 7, 2025Assignee: Samsung Electronics Co., Ltd.Inventors: Mohgan Perundurai Dakshinamoorthy, Ajith Kumar Kuppan, Sahil Rayu
-
Publication number: 20240357410Abstract: The present disclosure relates to field of telecommunication network and discloses method and apparatus e.g., network entity for network traffic management. The network entity may be associated with a Deep Packet Inspection System (DPI), the network entity receives an encrypted Quick User Datagram Protocol (UDP) Internet Connection (QUIC) data packet flow from a source. Further, network entity predicts using an Artificial Intelligence (AI) model, a relevancy of decryption for an encrypted QUIC initial handshake packet of the QUIC data packet flow based on at least one of pre-stored User Equipment (UE) context parameters, pre-stored server context parameters and flow context parameters of the encrypted QUIC data packet flow. The network entity decrypts the encrypted QUIC initial handshake packet based on the relevancy of the decryption being predicted to be useful. The present disclosure helps to optimize Deep Packet Inspection (DPI) operation.Type: ApplicationFiled: January 19, 2024Publication date: October 24, 2024Inventors: Uday TRIVEDI, Raviraj BHAT, Ajith Kumar KUPPAN
-
Publication number: 20240310065Abstract: A method of operating a HVAC system is provided. The method includes transferring heat between airflow and a heating element in the duct system. The heating element is configured to receive a fuel and ignite the fuel to heat the heating element. The method includes measuring a change in at least one gas property value of the airflow in the duct system using a leak detection sensor, where the change in the at least one gas property value is indicative of a gas leaked into the duct system. The method includes determining a concentration of the leaked gas based at least in part upon the change in the at least one gas property value and determining that the concentration as measured by the leak detection sensor has a negative value, where the negative value is indicative of the leaked gas comprising fuel.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Inventors: Vijay Kumar Sathyamurthi, Joe R. Powell, Darko Hadzidedic, Ajith Kumar Cherumani
-
Patent number: 12090651Abstract: A system including an autonomous ground vehicle (“AGV”) designed as a common platform to which is affixed one or more articulated arms, which, when combined with attached implements and software for performing movement of the AGV and the arm(s), carries out tasks common to small farms and maintaining small parcels of land. The software enables a farm operator to set up, control, and monitor operations of the robotic system.Type: GrantFiled: December 7, 2021Date of Patent: September 17, 2024Assignee: Easton Robotics, LLCInventors: Jeff Chandler, Govind Ajith Kumar, Pradeep Gopal
-
Publication number: 20240273878Abstract: Methods and systems are disclosed to enable users to analyze failure modes of computer vision machine learning models using error featurization. In one embodiment, an image classification model is expressed in a scatter plot of prediction errors over a labeled dataset. A user interface allows practitioners to identify patterns in data that cause the model to fail and supports high precision analysis of critical failure modes of trained machine learning (ML) models. The embodiment helps ML practitioners improve their curation, labeling, and training processes. The embodiments allow ML practitioners to choose the most relevant data for subsequent improvement of an ML model. The highly targeted data curation leads to a multifold reduction in costs and time for labeling and training data.Type: ApplicationFiled: February 22, 2024Publication date: August 15, 2024Applicant: Akridata, Inc.Inventors: Sabarish Vadarevu, Rakshith Sundaraiah, Ajith Kumar Battaje, Saurabh Manchanda, Azhar Mohammad, Vijay Karamcheti
-
Publication number: 20240161475Abstract: Methods and systems are disclosed to enable users to analyze failure modes of computer vision machine learning models using error featurization. In one embodiment, an image classification model is expressed in a scatter plot of prediction errors over a labeled dataset. A user interface allows practitioners to identify patterns in data that cause the model to fail and supports high precision analysis of critical failure modes of trained machine learning (ML) models. The embodiment helps ML practitioners improve their curation, labeling, and training processes. The embodiments allow ML practitioners to choose the most relevant data for subsequent improvement of an ML model. The highly targeted data curation leads to a multifold reduction in costs and time for labeling and training data.Type: ApplicationFiled: November 13, 2023Publication date: May 16, 2024Applicant: Akridata, Inc.Inventors: Sabarish Vadarevu, Rakshith Sundaraiah, Ajith Kumar Battaje, Saurabh Manchanda, Azhar Mohammad, Vijay Karamcheti
-
Publication number: 20240104277Abstract: A method, system, and computer program product are disclosed for implementing enhanced noise impact on function (NIOF) analysis of an IC design having nets in multiple different variable voltage domains next to each other and modeling all multiple worst-case victim-aggressor voltage configurations in a single run leveraging noise abstracts characterized at a single voltage corner. The NIOF analysis enables accurately identifying incorrect victim switching or functional fails, effectively and efficiently providing design verification and the ability to sign-off an IC design with a single run, and enable modifying an integrated circuit design to fix NIOF failures, and fabricating an integrated circuit.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: Steven Joseph KURTZ, Michael Henry SITKO, Rahul M. RAO, Sanjay UPRETI, Ajith Kumar Madathil CHANDRASEKARAN
-
Patent number: 11816027Abstract: A system comprising a processor and a memory storing instructions that, when executed, cause the system to receive a request for garbage collection, identify a range of physical blocks in a storage device, query a bitmap, the bitmap having a bit for each physical block in the range of physical blocks, determine a status associated with a first bit from the bitmap, in response to determining the status associated with the first bit is a first state, add a first physical block associated with the first bit to a list of physical blocks for relocation, and relocate the list of physical blocks.Type: GrantFiled: December 23, 2021Date of Patent: November 14, 2023Assignee: Western Digital Technologies, Inc.Inventors: Ajith Kumar Battaje, Tanay Goel, Rajendra Prasad Mishra
-
Publication number: 20230100136Abstract: The present disclosure discloses a method and system for traffic shaping for a user equipment (UE) in a wireless communication network. The method comprises: estimating a congestion at each of a plurality of cells in the wireless communication network based on one or more network key performance indicators (KPIs) associated with the wireless communication network, collecting movement data of the UE by monitoring a movement of the UE connected to a first cell, predicting, based on the movement data and at least one of the estimated congestion and a bandwidth delay product (BDP) of the each of the plurality of cells, whether the UE is likely to be handed over from the first cell to a second cell, and transmitting a congestion notification to a core network of the wireless communication network based on the prediction, to perform traffic shaping for the UE upon receiving the congestion notification.Type: ApplicationFiled: September 29, 2022Publication date: March 30, 2023Inventors: Vasanth Kanakaraj, Ajith Kumar Kuppan, Issaac Kommineni, Keerthi Priya P, Vishal Murgai, Hyunwoo Jang, Sridharan Natarajan
-
Patent number: 11609941Abstract: A data processing system which includes a data management system located in a first network, the data management system providing operations for modifying data stored by the first data management system, and a natural language processing system for processing natural language messages. The natural language processing system is located outside the first network. The system further comprises an interface application having access to the data management system adapted to: receive one or more natural language messages from a user; forward the natural language messages to the natural language processing system; receive an invocation message from the natural language processing system, the invocation message comprising operation data defining an operation to be performed at the data management system, the operation identified by the natural language processing system based on the natural language messages; and invoke the operation at the data management system based on the operation data.Type: GrantFiled: April 15, 2019Date of Patent: March 21, 2023Assignee: BRITISH GAS TRADING LIMITEDInventors: John Antony Folland, Deepak Chandar Govardhan, Kaushal Trivedi, Ajith Kumar Yadhagiri
-
Publication number: 20220338053Abstract: A method for communication by a source general packet radio service tunnelling protocol user (GTP-U) node in a wireless network is provided. The method includes receiving at least one data packet from at least one user equipment (UE), determining whether the at least one received data packet is at least one guaranteed bit rate (GBR) data packet or at least one non-GBR data packet, if the at least one received data packet is the at least one GBR data packet, transmitting the at least one received GBR data packet to at least one target GTP-U node, if the at least one received data packet is the at least one non-GBR data packet, storing the at least one received non-GBR data packet into a buffer before transmitting to the at least one target GTP-U node, and transmitting the at least one received non-GBR data packet to the at least one target GTP-U node based on a maximum segment size (MSS) of the buffer.Type: ApplicationFiled: April 14, 2022Publication date: October 20, 2022Inventors: Mohgan Perundurai DAKSHINAMOORTHY, Ajith Kumar KUPPAN, Sahil RAYU
-
Publication number: 20220176544Abstract: A system including an autonomous ground vehicle (“AGV”) designed as a common platform to which is affixed one or more articulated arms, which, when combined with attached implements and software for performing movement of the AGV and the arm(s), carries out tasks common to small farms and maintaining small parcels of land. The software enables a farm operator to set up, control, and monitor operations of the robotic system.Type: ApplicationFiled: December 7, 2021Publication date: June 9, 2022Inventors: Jeff Chandler, Govind Ajith Kumar, Pradeep Gopal
-
Publication number: 20220121564Abstract: A system comprising a processor and a memory storing instructions that, when executed, cause the system to receive a request for garbage collection, identify a range of physical blocks in a storage device, query a bitmap, the bitmap having a bit for each physical block in the range of physical blocks, determine a status associated with a first bit from the bitmap, in response to determining the status associated with the first bit is a first state, add a first physical block associated with the first bit to a list of physical blocks for relocation, and relocate the list of physical blocks.Type: ApplicationFiled: December 23, 2021Publication date: April 21, 2022Inventors: Ajith Kumar Battaje, Tanay Goel, Rajendra Prasad Mishra
-
Patent number: 11216361Abstract: A system comprising a processor and a memory storing instructions that, when executed, cause the system to receive a request for garbage collection, identify a range of physical blocks in a storage device, query a bitmap, the bitmap having a bit for each physical block in the range of physical blocks, determine a status associated with a first bit from the bitmap, in response to determining the status associated with the first bit is a first state, add a first physical block associated with the first bit to a list of physical blocks for relocation, and relocate the list of physical blocks.Type: GrantFiled: June 29, 2016Date of Patent: January 4, 2022Assignee: WESTERN DIGITAL TECHNOLOGIES, INC.Inventors: Ajith Kumar Battaje, Tanay Goel, Rajendra Prasad Mishra
-
Patent number: 11204815Abstract: A plurality of module twins that respectively correspond to modules of a plurality of modules of an edge application are stored on an edge device, and the modules comprise the edge application. The modules of the plurality of modules are capable of being used interoperably with other modules without altering the other modules. The plurality of module twins individually include metadata associated with the corresponding module of the plurality of modules. Communications are enabled between the modules of the plurality of modules and the IoT support service according to a common security context, and the metadata of each module twin of the plurality of module twins is synchronized based on the module.Type: GrantFiled: June 30, 2017Date of Patent: December 21, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Elio Damaggio, Affan Dar, Ajith Kumar Gande, Juan Perez, Samuel John George, Cameron William Skinner
-
Patent number: 11148689Abstract: The systems and methods described herein include monitoring systems and methods that monitor speeds of a motor of a vehicle represented as a pulse signal indicative of a rotational position of the motor. The systems and methods include receive a pulse signal from a speed sensor coupled to a traction motor. The pulse signal is indicative of a rotational position of the traction motor. The systems and methods include analyze the pulse signal to identify per-revolution signal reoccurrences that meet designated criteria, and determine a defect based on the per-revolution signal reoccurrences that are identified. The defect is one or more of a wheel defect, a bearing defect, or a gear defect.Type: GrantFiled: March 9, 2018Date of Patent: October 19, 2021Assignee: TRANSPORTATION IP HOLDINGS, LLCInventors: Bret Dwayne Worden, Ajith Kumar
-
Method and system for managing security vulnerability in host system using artificial neural network
Patent number: 11128655Abstract: This disclosure relates to method and system for managing security vulnerability in a host computer system. In an embodiment, the method may include receiving reputation data with respect to external network traffic data and receiving intrusion data with respect to host system data. The intrusion data may be generated by the host computer system based on the external network traffic data. The method may further include generating a plurality of test cases based on the reputation data and the intrusion data. The test cases, upon simulation, may provide information with respect to security vulnerability in the host computer system. The method may further include determining a set of implementable topologies for the host computer system, based on a simulation of each of the plurality of test cases, using a first artificial neural network (ANN) model to manage the security vulnerability.Type: GrantFiled: October 24, 2019Date of Patent: September 21, 2021Assignee: Wipro LimitedInventor: Ajith Kumar S -
Patent number: 11099913Abstract: A plurality of module twins that respectively correspond to modules of a plurality of modules of an edge application are stored on an edge device, and the modules comprise the edge application. The modules of the plurality of modules are capable of being used interoperably with other modules without altering the other modules. The plurality of module twins individually include metadata associated with the corresponding module of the plurality of modules. Communications are enabled between the modules of the plurality of modules and the IoT support service according to a common security context, and the metadata of each module twin of the plurality of module twins is synchronized based on the module.Type: GrantFiled: June 30, 2017Date of Patent: August 24, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Elio Damaggio, Affan Dar, Ajith Kumar Gande, Juan Perez, Samuel John George, Cameron William Skinner