Patents by Inventor Ajith Kumar

Ajith Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8973135
    Abstract: Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects are infected by malware). For instance, metadata that is associated with the objects may be reviewed to determine whether update(s) have been made with regard to the objects since a determination was made that the objects were not infected by malware. An update may involve increasing a number of the objects, modifying one of the objects, etc. Objects that have been updated (e.g., added and/or modified) since the determination may be scanned. Objects that have not been updated since the determination need not necessarily be scanned. For instance, an allowance may be made to perform operations with respect to the objects that have not been updated since the determination without first scanning the objects for infection by malware.
    Type: Grant
    Filed: September 29, 2011
    Date of Patent: March 3, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anil Francis Thomas, Adrian M. Marinescu, Ajith Kumar, Jonathan M. Keller, Omer Ben Bassat
  • Patent number: 8955133
    Abstract: The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt.
    Type: Grant
    Filed: June 9, 2011
    Date of Patent: February 10, 2015
    Assignee: Microsoft Corporation
    Inventors: Ajith Kumar, Timothy Jon Fraser, Adrian M. Marinescu, Marc E. Seinfeld, Jack Wilson Stokes, III, Anil Francis Thomas
  • Patent number: 8949555
    Abstract: In one embodiment of the invention, a memory system includes non-volatile-memory-devices (NVMDs) coupled to memory channels to share busses and a memory controller coupled to the memory channels in communication between the plurality of NVMDs. Each NVMD independently executes a read, write, or erase operation at a time. The memory controller includes channel schedulers to schedule control and data transfers associated with the read, write, and erase operations on the memory channels; and high priority and low priority queues coupled to the channel schedulers. The channel schedulers prioritize operations waiting in the high priority queues over operations waiting in the low priority queues. The channel schedulers further prioritize read operations waiting in either the high priority queue or the low priority queue over write and erase operations waiting in each respective queue.
    Type: Grant
    Filed: June 16, 2011
    Date of Patent: February 3, 2015
    Assignee: Virident Systems, Inc.
    Inventors: Vijay Karamcheti, Shibabrata Mondal, Ajith Kumar
  • Publication number: 20140359573
    Abstract: Tools and techniques support troubleshooting live application visuals, including transient markup expression issues in XAML or HTML. A LADRT module supports troubleshooting without pausing application execution to help inspect and modify visual construct properties, and to identify and alter source code pertaining to a selected visual construct. Changes are serialized back to the application program source code and reflected in real time in the executing application, without a rebuild. Markup annotation preserves pre-evaluation versions of markup expressions for binding, static resource identification, and custom purposes. Markup annotation also correlates visual constructs and source code. The LADRT module operates independently of debuggers, and may autoload with the application. Program project and source code changes are not required for troubleshooting capability.
    Type: Application
    Filed: May 29, 2013
    Publication date: December 4, 2014
    Applicant: Microsoft Corporation
    Inventors: Harikrishna Menon Ajith Kumar, Kenneth Lawrence Young, Unnikrishnan Ravindranathan, Christian Schormann
  • Publication number: 20140304456
    Abstract: A memory apparatus and methods are provided for preventing read errors on weak pages in a non-volatile memory system. In one example, a method includes identifying a weak page in a non-volatile memory device along a word line, wherein the weak page is partially written with at least some data; buffering data associated with the weak page to a weak page buffer that is coupled in communication with the non-volatile memory device; determining that an amount of data in the weak page buffer has reached a predetermined data level; and writing the data from the weak page buffer into the weak page along the word line in the non-volatile memory device.
    Type: Application
    Filed: February 10, 2014
    Publication date: October 9, 2014
    Inventors: Ashwin Narasimha, Vibhor Patel, Sandeep Sharma, Ajith Kumar
  • Publication number: 20140304560
    Abstract: A memory apparatus and methods are provided for preventing read errors on weak pages in a non-volatile memory system. In one example, a method includes identifying a weak page in a non-volatile memory device along a word line, wherein the weak page is partially written with at least some data; buffering data associated with the weak page to a weak page buffer that is coupled in communication with the non-volatile memory device; determining that an amount of data in the weak page buffer has reached a predetermined data level; and writing the data from the weak page buffer into the weak page along the word line in the non-volatile memory device.
    Type: Application
    Filed: February 10, 2014
    Publication date: October 9, 2014
    Inventors: Ashwin Narasimha, Vibhor Patel, Sandeep Sharma, Ajith Kumar
  • Publication number: 20140281152
    Abstract: Some implementations include a method of managing a hosted non-volatile random-access memory (NVRAM) based storage subsystem that includes NVRAM devices. The method includes: receiving, at a device driver on the host computing device, write requests each requesting to write a respective unit of data to the NVRAM-based storage subsystem; categorizing the write requests into subgroups of write requests, where write requests within respective subgroups are mutually exclusive; ascertaining a load condition of each of several of the NVRAM devices of the NVRAM-based storage subsystem; identifying a target location on at least one NVRAM device to service a particular subgroup of write requests according to the ascertained load conditions of the NVRAM devices of the NVRAM-based storage subsystem; and servicing the particular subgroup of write requests by writing the corresponding units of data to the identified target location on the at least one NVRAM device of the NVRAM-based storage subsystem.
    Type: Application
    Filed: June 26, 2013
    Publication date: September 18, 2014
    Inventors: Vijay Karamcheti, Ashish Singhai, Shibabrata Mondal, Ajith Kumar
  • Publication number: 20140281133
    Abstract: Some implementations include a method of managing a hosted non-volatile random-access memory (NVRAM) based storage subsystem that includes NVRAM devices. The method includes: receiving, at a device driver on the host computing device, write requests each requesting to write a respective unit of data to the NVRAM-based storage subsystem; categorizing the write requests into subgroups of write requests, where write requests within respective subgroups are mutually exclusive; ascertaining a load condition of each of several of the NVRAM devices of the NVRAM-based storage subsystem; identifying a target location on at least one NVRAM device to service a particular subgroup of write requests according to the ascertained load conditions of the NVRAM devices of the NVRAM-based storage subsystem; and servicing the particular subgroup of write requests by writing the corresponding units of data to the identified target location on the at least one NVRAM device of the NVRAM-based storage subsystem.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventors: Vijay Karamcheti, Ashish Singhai, Shibabrata Mondal, Ajith Kumar
  • Publication number: 20140281121
    Abstract: Some implementations include a method of managing a hosted non-volatile random-access memory (NVRAM) based storage subsystem that includes NVRAM devices. The method includes: receiving, at a device driver on the host computing device, write requests each requesting to write a respective unit of data to the NVRAM-based storage subsystem; categorizing the write requests into subgroups of write requests, where write requests within respective subgroups are mutually exclusive; ascertaining a load condition of each of several of the NVRAM devices of the NVRAM-based storage subsystem; identifying a target location on at least one NVRAM device to service a particular subgroup of write requests according to the ascertained load conditions of the NVRAM devices of the NVRAM-based storage subsystem; and servicing the particular subgroup of write requests by writing the corresponding units of data to the identified target location on the at least one NVRAM device of the NVRAM-based storage subsystem.
    Type: Application
    Filed: June 26, 2013
    Publication date: September 18, 2014
    Inventors: Vijay Karamcheti, Ashish Singhai, Shibabrata Mondal, Ajith Kumar
  • Patent number: 8774994
    Abstract: A method is provided for controlling a drivetrain of a vehicle which includes a prime mover operatively connected to at least one tractive element. The method includes: (a) determining the vehicle's total weight; and (b) using an electronic controller carried by the vehicle, causing the prime mover to apply power to the tractive element so as to propel the vehicle, the magnitude of the power being a function of the vehicle's total weight.
    Type: Grant
    Filed: July 15, 2009
    Date of Patent: July 8, 2014
    Assignee: General Electric Company
    Inventors: Henry Todd Young, Ajith Kumar
  • Patent number: 8768543
    Abstract: A system for providing at least one of train information and track characterization information for use in train performance, including a first element to determine a location of a train on a track segment and/or a time from a beginning of the trip. A track characterization element to provide track segment information, and a sensor for measuring an operating condition of at least one of the locomotives in the train are also included. A database is provided for storing track segment information and/or the operating condition of at least one of the locomotives. A processor is also included to correlate information from the first element, the track characterization element, the sensor, and/or the database, so that the database may be used for creating a trip plan that optimizes train performance in accordance with one or more operational criteria for the train.
    Type: Grant
    Filed: January 11, 2007
    Date of Patent: July 1, 2014
    Assignee: General Electric Company
    Inventors: Ajith Kumar, Glenn Robert Shaffer
  • Patent number: 8769693
    Abstract: The trust reputation of the combination of an installation package and installer, as a pair, and the combination of a file and an installer, as a pair, is used to store the identity of a file in a persistent cache. An entry in the persistent cache indicates the trust worthiness of a file that does not contain malware thereby avoiding a scan of the file for malware. The trust worthiness of a file may be determined from known trust reputations of the installation package, installer, and file from a network of computing resources. By relying on the known trust reputation of the combination of the installation package and installer and the combination of the file and installer, the identity of the file may be stored in persistent cache quickly.
    Type: Grant
    Filed: January 16, 2012
    Date of Patent: July 1, 2014
    Assignee: Microsoft Corporation
    Inventors: William Pfeifer, Joseph Johnson, Ronald Thompson, Ajith Kumar, Nitin Sood
  • Publication number: 20140151460
    Abstract: A system for use with a vehicle includes at least one nozzle and an fluid reservoir capable of holding a volume of pressurized gas or other fluid. The air reservoir is in fluid communication with the at least one nozzle and the at least one nozzle is selectively operable to direct the pressurized gas or other fluid at a surface of an optical inspection sensor assembly to remove contaminants from the sensor assembly.
    Type: Application
    Filed: December 2, 2013
    Publication date: June 5, 2014
    Inventors: Joseph Forrest Noffsinger, John Kramer, Bret Dwayne Worden, Ajith Kumar
  • Patent number: 8688700
    Abstract: Techniques that enable a user or customer at a system site to review and, if desired, modify data identified at the system site for transmission to a diagnosis site prior to the transmission. The identified diagnostic data may be modified such that data that the user does not want to be sent to the diagnosis site (e.g., sensitive data) is excluded from the data communicated to the diagnosis site. The data may be modified by removing or excluding the sensitive data from the data that is communicated to the diagnosis site or replacing the sensitive data with non-sensitive data. The modified data may then be communicated from the system site to the diagnosis site in the form of a package.
    Type: Grant
    Filed: October 15, 2008
    Date of Patent: April 1, 2014
    Assignee: Oracle International Corporation
    Inventors: Marcus Fallen, Benoit Dageville, Jonathan Klein, Ajith Kumar Mysorenagarajarao, Gary Ngai, Mark Ramacher, Yair Sarig
  • Patent number: 8626371
    Abstract: Diagnosing auxiliary equipment associated with an engine. A condition of the auxiliary equipment is diagnosed based on information provided by signals from a generator operationally connected to the auxiliary equipment or other signals associated with the engine. Different types of degradation are distinguished based on discerning characteristics within the information. Thus, a degraded auxiliary equipment component can be identified in a manner that reduces service induced delay.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: January 7, 2014
    Assignee: General Electric Company
    Inventors: Ajith Kumar, Somakumar Ramachandrapanicker, Paul Flynn, Arijit Banerjee, Rupam Mukherjee
  • Patent number: 8626372
    Abstract: A condition of an engine is diagnosed based on information provided by signals from speed sensors associated with the engine or other signals associated with a generator operationally connected to the engine. Different types of degradation are distinguished based on discerning characteristics within the information. Thus, a degraded engine component can be identified in a manner that reduces service induced delay.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: January 7, 2014
    Assignee: General Electric Company
    Inventors: Ajith Kumar, Somakumar Ramachandrapanicker, Paul Flynn, Arijit Banerjee, Rupam Mukherjee
  • Patent number: 8538626
    Abstract: Methods and systems are provided for an engine. A condition of the engine may be diagnosed based on a combustion torque profile of the engine estimated using signals from a generator operationally connected to the engine and/or other signals associated with the engine. Different types of degradation may be distinguished based on discerning characteristics within the estimated combustion torque profile data. Thus, a degraded engine component may be identified in a manner that reduces service induced delay.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: September 17, 2013
    Assignee: General Electric Company
    Inventors: Ajith Kumar, Somakumar Ramachandrapanicker, Paul Flynn, Arijit Banerjee, Rupam Mukherjee
  • Publication number: 20130185799
    Abstract: The trust reputation of the combination of an installation package and installer, as a pair, and the combination of a file and an installer, as a pair, is used to store the identity of a file in a persistent cache. An entry in the persistent cache indicates the trust worthiness of a file that does not contain malware thereby avoiding a scan of the file for malware. The trust worthiness of a file may be determined from known trust reputations of the installation package, installer, and file from a network of computing resources. By relying on the known trust reputation of the combination of the installation package and installer and the combination of the file and installer, the identity of the file may be stored in persistent cache quickly.
    Type: Application
    Filed: January 16, 2012
    Publication date: July 18, 2013
    Applicant: Microsoft Corporation
    Inventors: William Pfeifer, Joseph Johnson, Ronald Thompson, Ajith Kumar, Nitin Sood
  • Patent number: 8473127
    Abstract: A method for improving train performance, the method including determining a rail car parameter for at least one rail car to be included in a train, and creating a train trip plan based on the rail car parameter in accordance with one or more operational criteria for the train.
    Type: Grant
    Filed: January 9, 2007
    Date of Patent: June 25, 2013
    Assignee: General Electric Company
    Inventors: Wolfgang Daum, John Erik Hershey, David Michael Peltz, Glenn Robert Shaffer, Joseph Forrest Noffsinger, John Borntraeger, Ajith Kumar
  • Patent number: 8468347
    Abstract: Apparatus, systems, and methods may operate to establish a secure communications tunnel between a server node and a client node, and to receive user requests from the client node at the server node via the secure communications tunnel. The user requests may be received in conjunction with a device verification token derived from nonces generated by the server node and transmitted to the client node as part of keep-alive response messages. The nonces may change according to a period of time established by the server node. Additional apparatus, systems, and methods are disclosed.
    Type: Grant
    Filed: February 19, 2009
    Date of Patent: June 18, 2013
    Assignee: EMC Corporation
    Inventors: Prakash Umasankar Mukkara, Ajith Kumar, Subbaraju Uppalapati, Vishnu Vardhan, Sureshkumar Thangavel