Patents by Inventor Anand Sinha
Anand Sinha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240126698Abstract: Systems, methods, and other embodiments for supporting high availability by using in-memory cache as a database are disclosed. In one embodiment, a system includes an application server that is configured to select a sub-set of data from a remote database that is predicted to be accessed by an application server, wherein the application server includes an in-memory cache. The sub-set of data is reformatted to reduce the size. The in-memory cache is configured to act as a backup database by pre-populating the reformatted sub-set of data into the in-memory cache. In response to detecting the remote database is in an off-line state: the in-memory cache is assigned as a primary database to replace the remote database and subsequent data requests are re-directed from being processed using the remote database to being processed using the in-memory cache.Type: ApplicationFiled: October 18, 2022Publication date: April 18, 2024Inventors: Anurag Anand SINHA, Prakhar RASTOGI, Harish Kumar DALMIA
-
Publication number: 20240072783Abstract: A pulse generator circuit includes a charge pump having a charge pump output. A voltage divider is coupled to the charge pump output. The voltage divider has a voltage divider output. An error amplifier has a first error amplifier input and a second error amplifier input. The first error amplifier input is coupled to the voltage divider output. A dependent current source circuit has a first input coupled to the charge pump output, a second input coupled to the voltage divider output, and a third input coupled to the second error amplifier input. The dependent current source is configured to cause a current to flow from the charge pump output that is proportional to a difference between a first voltage at the voltage divider output and a second voltage at the second error amplifier input.Type: ApplicationFiled: August 31, 2022Publication date: February 29, 2024Inventors: Rohan SINHA, Anand KAMRA
-
Patent number: 11238872Abstract: A method and apparatus for managing agent interactions with customers of an enterprise are disclosed. The method includes generating a value representative of an emotional state of a customer engaged in an ongoing interaction with a virtual agent (VA) associated with the enterprise. The value is generated based, at least in part, on one or more inputs provided by the customer during the ongoing interaction. The value is compared with a predefined emotional threshold range to determine whether the emotional state of the customer is a non-neutral state. The ongoing interaction is deflected to one of a human agent and a specialized VA capable of empathetically handling the ongoing interaction if it is determined that the emotional state of the customer is the non-neutral state.Type: GrantFiled: November 20, 2018Date of Patent: February 1, 2022Assignee: [24]7.ai, Inc.Inventors: Pallipuram V. Kannan, Anand Sinha
-
Publication number: 20190156838Abstract: A method and apparatus for managing agent interactions with customers of an enterprise are disclosed. The method includes generating a value representative of an emotional state of a customer engaged in an ongoing interaction with a virtual agent (VA) associated with the enterprise. The value is generated based, at least in part, on one or more inputs provided by the customer during the ongoing interaction. The value is compared with a predefined emotional threshold range to determine whether the emotional state of the customer is a non-neutral state. The ongoing interaction is deflected to one of a human agent and a specialized VA capable of empathetically handling the ongoing interaction if it is determined that the emotional state of the customer is the non-neutral state.Type: ApplicationFiled: November 20, 2018Publication date: May 23, 2019Inventors: Pallipuram V. Kannan, Anand Sinha
-
Patent number: 10032035Abstract: The present disclosure involves systems and computer implemented methods for protecting portions of electronic documents. An example method includes receiving a request for access to an electronic file having sections, at least one section encrypted using a first key based on a first password. A second key is generated in response to receiving a second password, wherein the second key is generated based on the second password. The second key is compared to the first key. If the second key is identical to the first key, the least one section of the electronic file encrypted using the first key is decrypted using the second key. The electronic file is then presented such that the section(s) previously encrypted using the first cryptographic key is made visible. If the second key is not identical to the first, the electronic file is presented with the encrypted section(s) obscured.Type: GrantFiled: August 29, 2017Date of Patent: July 24, 2018Assignee: SAP SEInventors: Anand Sinha, Vinay Sheel
-
Patent number: 9876507Abstract: Systems and methods for the semantic compression of structured data include identifying attributes of elements in a collection structure, such as a table. The attributes may be grouped and the grouping used to consolidate attribute values used in the elements. An index of repeated attribute values may also be generated and used to replace the attribute values in elements of the structured data.Type: GrantFiled: February 22, 2013Date of Patent: January 23, 2018Assignee: SAP SEInventors: Ashutosh Rastogi, Anand Sinha
-
Publication number: 20180004963Abstract: The present disclosure involves systems and computer implemented methods for protecting portions of electronic documents. An example method includes receiving a request for access to an electronic file having sections, at least one section encrypted using a first key based on a first password. A second key is generated in response to receiving a second password, wherein the second key is generated based on the second password. The second key is compared to the first key. If the second key is identical to the first key, the least one section of the electronic file encrypted using the first key is decrypted using the second key. The electronic file is then presented such that the section(s) previously encrypted using the first cryptographic key is made visible. If the second key is not identical to the first, the electronic file is presented with the encrypted section(s) obscured.Type: ApplicationFiled: August 29, 2017Publication date: January 4, 2018Inventors: Anand Sinha, Vinay Sheel
-
Patent number: 9773119Abstract: The present disclosure involves systems and computer implemented methods for protecting portions of electronic documents. An example method includes receiving a request for access to an electronic file having sections, at least one section encrypted using a first key based on a first password. A second key is generated in response to receiving a second password, wherein the second key is generated based on the second password. The second key is compared to the first key. If the second key is identical to the first key, the least one section of the electronic file encrypted using the first key is decrypted using the second key. The electronic file is then presented such that the section(s) previously encrypted using the first cryptographic key is made visible. If the second key is not identical to the first, the electronic file is presented with the encrypted section(s) obscured.Type: GrantFiled: February 25, 2015Date of Patent: September 26, 2017Assignee: SAP SEInventors: Anand Sinha, Vinay Sheel
-
Patent number: 9607012Abstract: In one embodiment, metadata associated with a document is received. At least one keyword is extracted from the received metadata, wherein the at least one keyword include at least one of actionable information and non-actionable information. Further, an interactive graphical document insight element is generated including a representation of the non-actionable information and one or more interactive icons representing the actionable information. The generated interactive graphical document insight element is rendered on a computer generated user interface.Type: GrantFiled: March 6, 2013Date of Patent: March 28, 2017Assignee: BUSINESS OBJECTS SOFTWARE LIMITEDInventors: Dharmesh Rana, Anand Sinha
-
Publication number: 20160357971Abstract: The present disclosure involves systems and computer implemented methods for protecting portions of electronic documents. An example method includes receiving a request for access to an electronic file having sections, at least one section encrypted using a first key based on a first password. A second key is generated in response to receiving a second password, wherein the second key is generated based on the second password. The second key is compared to the first key. If the second key is identical to the first key, the least one section of the electronic file encrypted using the first key is decrypted using the second key. The electronic file is then presented such that the section(s) previously encrypted using the first cryptographic key is made visible. If the second key is not identical to the first, the electronic file is presented with the encrypted section(s) obscured.Type: ApplicationFiled: February 25, 2015Publication date: December 8, 2016Inventors: Anand Sinha, Vinay Sheel
-
Patent number: 9210161Abstract: A certificate of a user is presented by a client to a server. The certificate is used to authenticate communications between the client and the server. Thereafter, data from the certificate is cached at the server. The server then initiates one or more business intelligence processes of a business intelligence application at the client using the cached data to provide context to the one or more business intelligence processes. Related apparatus, systems, techniques and articles are also described.Type: GrantFiled: December 13, 2011Date of Patent: December 8, 2015Assignee: Business Objects Software LimitedInventor: Anand Sinha
-
Patent number: 9197501Abstract: In an embodiment, mobile application downloaded and installed in a mobile device is launched for the first time. The mobile application automatically locates a configuration server and connects automatically to the located configuration server. After connection is established with the configuration server, appropriate configuration parameters set is identified and automatically fetched to the mobile device. The fetched configuration parameters set is automatically applied to the mobile application. After applying the configuration parameters set, automatically authenticate the mobile application to an enterprise server. Thus, when the user of the mobile device launches the installed mobile application for the first time, the zero-step auto-customization noted above takes place without manual intervention. The user is thus able to use the mobile application in a normal manner subject to the configurations applied.Type: GrantFiled: August 9, 2013Date of Patent: November 24, 2015Assignee: SAP SEInventors: Anand Sinha, Vinay Sheel, Gowda Timma Ramu
-
Publication number: 20150046994Abstract: In an embodiment, mobile application downloaded and installed in a mobile device is launched for the first time. The mobile application automatically locates a configuration server and connects automatically to the located configuration server. After connection is established with the configuration server, appropriate configuration parameters set is identified and automatically fetched to the mobile device. The fetched configuration parameters set is automatically applied to the mobile application. After applying the configuration parameters set, automatically authenticate the mobile application to an enterprise server. Thus, when the user of the mobile device launches the installed mobile application for the first time, the zero-step auto-customization noted above takes place without manual intervention. The user is thus able to use the mobile application in a normal manner subject to the configurations applied.Type: ApplicationFiled: August 9, 2013Publication date: February 12, 2015Inventors: Anand SINHA, Vinay SHEEL, Gowda Timma RAMU
-
Patent number: 8935807Abstract: Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request for displaying a report. It is determined whether the requested report comprises sensitive data. When the report comprises the sensitive data, a display rule related to the sensitive data is identified. Based upon the identified display rule, the sensitive data within the report is displayed.Type: GrantFiled: November 28, 2012Date of Patent: January 13, 2015Assignee: SAP SEInventors: Anand Sinha, Vinay Sheel
-
Publication number: 20140258927Abstract: In one embodiment, metadata associated with a document is received. At least one keyword is extracted from the received metadata, wherein the at least one keyword include at least one of actionable information and non-actionable information. Further, an interactive graphical document insight element is generated including a representation of the non-actionable information and one or more interactive icons representing the actionable information. The generated interactive graphical document insight element is rendered on a computer generated user interface.Type: ApplicationFiled: March 6, 2013Publication date: September 11, 2014Inventors: DHARMESH RANA, Anand Sinha
-
Publication number: 20140244602Abstract: Systems and methods for the semantic compression of structured data include identifying attributes of elements in a collection structure, such as a table. The attributes may be grouped and the grouping used to consolidate attribute values used in the elements. An index of repeated attribute values may also be generated and used to replace the attribute values in elements of the structured data.Type: ApplicationFiled: February 22, 2013Publication date: August 28, 2014Applicant: SAP AGInventors: Ashutosh RASTOGI, Anand SINHA
-
Publication number: 20140150114Abstract: Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request for displaying a report. It is determined whether the requested report comprises sensitive data. When the report comprises the sensitive data, a display rule related to the sensitive data is identified. Based upon the identified display rule, the sensitive data within the report is displayed.Type: ApplicationFiled: November 28, 2012Publication date: May 29, 2014Inventors: Anand SINHA, Vinay SHEEL
-
Patent number: 8671130Abstract: A system for managing the exchange of data items between a mail database on a mail server and a mobile communication device operable to send and receive data items over a wireless network, wherein the mail database and the mobile communication device are associated with a user address and wherein the data items are stored in the mail database and referenced by corresponding mail database identifiers, includes a state database associated with the user address. The state database is operable to receive and store the mail database identifiers corresponding to the data items stored in the mail database.Type: GrantFiled: September 23, 2002Date of Patent: March 11, 2014Assignee: BlackBerry LimitedInventors: Anand Sinha, Allan D. Lewis, Carl L. Cherry, Andrew J. Legg, Jeffrey R. Schnurr
-
Patent number: 8671410Abstract: A method for allocating threads to a user in a computer system is described. The method comprises queuing up work for a first user and permanently assigning a first thread to the first user, wherein the first thread performs the queued up work for the first user, and wherein each time work is subsequently queued up for the first user, the first thread performs the queued up work for the first user.Type: GrantFiled: September 30, 2005Date of Patent: March 11, 2014Assignee: BlackBerry LimitedInventor: Anand Sinha
-
Publication number: 20130151847Abstract: A certificate of a user is presented by a client to a server. The certificate is used to authenticate communications between the client and the server. Thereafter, data from the certificate is cached at the server. The server then initiates one or more business intelligence processes of a business intelligence application at the client using the cached data to provide context to the one or more business intelligence processes. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: December 13, 2011Publication date: June 13, 2013Applicant: Business Objects Software LimitedInventor: Anand Sinha