Patents by Inventor Andrew Patel

Andrew Patel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240132509
    Abstract: Disclosed are quinoline and quinazoline compounds which modulate the activity of the gated ion channels. Compounds that modulate these gated ion channels are useful in the treatment of diseases and disorders related to pain, inflammation, the neurological system, the gastrointestinal system and genitourinary system. Preferred compounds include quinoline or quinazoline derivatives substituted at the 4-position via N(H), C(O) or O moieties.
    Type: Application
    Filed: November 13, 2023
    Publication date: April 25, 2024
    Inventors: Nadiya Sydorenko, Md Rauful Alam, Michael A. Arnold, Suresh Babu, Anuradha Bhattacharyya, Guangming Chen, Aleksey I. Gerasyuto, Gary Mitchell Karp, Andrew J. Kassick, Anthony R. Mazzotti, Young-Choon Moon, Jana Narasimhan, Jigar Patel, Anthony Turpoff, Matthew G. Woll, Wuming Yan, Nanjing Zhang
  • Patent number: 11965020
    Abstract: Antigen binding molecules (ABMs) comprising Fab domains in non-native configurations, ABM conjugates comprising the ABMs and cytotoxic or cytostatic agents, pharmaceutical compositions containing the ABMs and ABM conjugates, methods of using the ABMs, ABM conjugates and pharmaceutical compositions for treating cancer, nucleic acids encoding the ABMs, cells engineered to express the ABMs, and methods of producing ABMs.
    Type: Grant
    Filed: May 17, 2023
    Date of Patent: April 23, 2024
    Assignee: Regeneron Pharmaceuticals, Inc.
    Inventors: Tong Zhang, Erica Pyles, Michael Rosconi, Nina Liu, Supriya Patel, Eric Smith, Andrew Murphy, Chia-Yang Lin, Samuel Davis
  • Patent number: 11962030
    Abstract: An integrated, unitary battery pack may be formed and used as part of the structural support for a vehicle frame. The unitary battery pack includes arrays cells having all positive and negative electrical terminals aligned in-plane on a common face of the product assembly. The unitary battery pack includes cooling components for passively or actively cooling the cell arrays. The unitary battery pack is encased in a potting material that allows that forms part of the structure support for the unitary battery pack. The unitary batter pack may be integrated into the vehicle with or without additional support structures.
    Type: Grant
    Filed: November 20, 2020
    Date of Patent: April 16, 2024
    Assignee: Tesla, Inc.
    Inventors: Andrew Pires, Robert David Sumpf, Jr., William B. Stockton, Cole Spooner, Cole Prodan, Jayesh Bharat Gorasia, Kenton Harris, Dan Burke, Dafna Gabriela Szafer, Krupal Patel, Benjamin Parker, David Elias Hegeman
  • Patent number: 11949294
    Abstract: An assembly comprises a resistor plate for a rotating rectifier assembly (RRA). A shaft bore is defined through the resistor plate for passage of a shaft of an electrical machine, and the resistor plate defines a main annular body around the shaft bore. A first protrusion extends radially outward from the main annular body, so that a first pin bore extends through the first protrusion. At least one contact band is seated in a the pin bore of the resistor plate for mounting a direct current (DC) pin to the resistor plate.
    Type: Grant
    Filed: March 13, 2021
    Date of Patent: April 2, 2024
    Assignee: Hamilton Sundstrand Corporation
    Inventors: Kyle S. Sirbasku, Dhaval Patel, Andrew R. Wilkinson, Mary Christelle Ann Calacal, Yaser J. Isa, Edward C. Allen, Duane C. Johnson
  • Patent number: 11949659
    Abstract: A first packet of a packet flow is received at a classifying network device. The first packet is forwarded from the classifying network device to a firewall network device. An indication that the packet flow is to be offloaded is received at the classifying network device. Data is stored at the classifying network device indicating that the packet flow is to be offloaded. A non-control packet of the packet flow is received at the classifying network device. A determination is made that the non-control packet belongs to the packet flow by comparing data contained in the non-control packet to the stored data. The non-control packet of the packet flow is directed to a processing entity in response to the determining. A control packet of the packet flow is received at the classifying network device. The control packet of the packet flow is directed to the firewall network device.
    Type: Grant
    Filed: July 13, 2021
    Date of Patent: April 2, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Pradeep Patel, Jonathan A. Kunder, Ashish K. Dey, Andrew E. Ossipov, Jianxin Wang
  • Patent number: 11949276
    Abstract: A system describing Unlimited Range Drive capabilities of electric vehicles using machine learning techniques, assisted by intelligent battery modules and high voltage continuous variable power plant, the intelligent battery and power plant modules work in harmony and continuously provide feedback to each other, causing a battery to recharge while the other is in use to drive, this charging/recharging process and dynamically switching battery in use is continued until physical life of batteries is exhausted approximately 10 to 15 years, dynamic coordination of modules with dynamic switching of batteries, achieves unlimited range drive capabilities which may exceed 1 million mile drive on a single high voltage battery charge, the system provides clean environment and cost effective solution, this platform can be implemented in larger chassis including, but not limited to light duty trucks and vans up to heavy duty cargo tractor trailer and commercial public transportation buses.
    Type: Grant
    Filed: August 21, 2021
    Date of Patent: April 2, 2024
    Inventors: Mitul M Patel, Michael Andrew Generallo, Luna Yaisi Manuel
  • Publication number: 20240105319
    Abstract: A system can include a location data module configured to receive location data, the location data including patient location information associated with a plurality patients and care team member location information associated with one or more care team members, and a route module operatively connected to the location data module and configured to determine a visitation route for each of the one or more care team members to visit the plurality of patients based on the location data.
    Type: Application
    Filed: September 28, 2023
    Publication date: March 28, 2024
    Applicant: AndorHealth, LLC
    Inventors: Maha Ahmed, William Beamer, Sonali Carumbaya, Lauren Cuppy, Declan Fortune, Jack Gilmore, Siddarth Kasi, Neha Mahmood, Nishanth Reddy, Chanakya Toleti, Chandini Toleti, Kalyan Toleti, Tatiana Vallejo, Andrew Langford, Pritesh Patel, Balavignesh Thirumalainambi, Srini Surendranath, Raj Toleti
  • Publication number: 20240096461
    Abstract: An inbound message including medical record content may be received. The inbound message may indicate a healthcare entity and a vendor entity. It may be determined, from the healthcare entity and stored correspondences between medical record formats and healthcare entities, that the medical record content of the inbound message is in a first medical record format. Which configuration record of stored configuration records specifying combinations of sets of rules may be determined to apply as a translation to the inbound message based upon the medical record content of the inbound message and the first medical record format. The sets of rules as indicated by the configuration record may be accessed and applied to the inbound message to translate the medical record content in the inbound message from the first medical record format to the standardized format. The standardized format may be transmitted to the vendor entity.
    Type: Application
    Filed: November 29, 2023
    Publication date: March 21, 2024
    Inventors: James Lloyd, Christopher Tobin-Campbell, Andrew Kitson, Nicholas Hatt, Nijay Patel
  • Patent number: 11923718
    Abstract: Our system describes Unlimited Range Drive (URD) capabilities of an electrical automotive vehicle using machine learning technique, assisted by newly designed intelligent battery modules (IBM-R, IBM-D/R) and newly invented high voltage continuous variable power plant (CVPP), our intelligent battery and power plant modules work in harmony and continuously provide feedback to each other, causing a high voltage battery to recharge while other high voltage battery is in use to drive a vehicle, this charging/recharging process and dynamically switching high voltage battery in use is continued until physical life of batteries is exhausted which may be 10 to 15 years, dynamic coordination of the modules with dynamic switching of battery in use archives Unlimited Range Drive (URD) capabilities which may exceed more than 1 million miles drive on a single high voltage battery charge, our URD system provides clean environment and cost effective more than 1 million miles drive solution.
    Type: Grant
    Filed: May 3, 2021
    Date of Patent: March 5, 2024
    Inventors: Mitul M Patel, Michael Andrew Generallo, Luna Yaisi Manuel
  • Patent number: 11032313
    Abstract: There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily include identification of an electronic file to be scanned for malware, generation of at least one scanning object of the identified electronic file on the basis of a dynamic configuration by a remote entity, said at least one scanning object being generated by using malware-susceptible data of the identified electronic file and neglecting malware-insusceptible data of the identified electronic file, transfer of the at least one scanning object of the identified electronic file for remote malware scanning to the remote entity, and execution of a malware scan of the at least one scanning object of the electronic file at the remote entity by a malware scanning engine or application.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: June 8, 2021
    Assignee: F-Secure Corporation
    Inventors: Juha Ylipekkala, Jammu Kekkonen, Andrew Patel, Jarno Niemela, Jari Savander, Jani Jappinen, Juho Heikkinen, Zimry Ong
  • Publication number: 20160248786
    Abstract: There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily comprise include identification of an electronic file to be scanned for malware, generation of at least one scanning object of the identified electronic file on the basis of a dynamic configuration by a remote entity, said at least one scanning object being generated by using malware-susceptible data of the identified electronic file and neglecting malware-insusceptible data of the identified electronic file, transfer of the at least one scanning object of the identified electronic file for remote malware scanning to the remote entity, and execution of a malware scan of the at least one scanning object of the electronic file at the remote entity by a malware scanning engine or application.
    Type: Application
    Filed: February 18, 2016
    Publication date: August 25, 2016
    Inventors: Juha YLIPEKKALA, Jammu Kekkonen, Andrew PATEL, Jarno NIEMELA, Jari SAVANDER, Jani JAPPINEN, Juho HEIKKINEN, Zimry ONG
  • Patent number: 9392014
    Abstract: This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a social media application is detected by the computer security routine. The user input indicates that a user wants to share content with at least one other user through the social media application. In response, the computer security routine suspends said sharing and performs, before determining whether or not to allow the sharing, a security check for suspiciousness of contents the user intends to share.
    Type: Grant
    Filed: September 10, 2013
    Date of Patent: July 12, 2016
    Assignee: F-Secure Corporation
    Inventors: Paolo Palumbo, Andrew Patel
  • Patent number: 9231971
    Abstract: According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.
    Type: Grant
    Filed: November 4, 2013
    Date of Patent: January 5, 2016
    Assignee: F-Secure Corporation
    Inventors: Andrew Patel, Igor Afanasiev, Veli-Jussi Kesti, Urmas Rahu, Yury Yakovlev, Jarkko Konola, Janne Pirttilahti
  • Patent number: 9124617
    Abstract: A method of inhibiting the spread of malware across a network of interconnected computer terminals. The method includes detecting malware or suspicious behavior at a first computer terminal and inspecting the first computer terminal, before and/or after said step of detecting malware or suspicious behavior, to identify contacts forming part of a social network. Identities of the identified contacts are sent to a backend security system, and at the backend security system, said identities are received and instructions sent to one or more second computer terminals associated with respective identities to cause those second computer terminals to implement an increased level of security.
    Type: Grant
    Filed: July 2, 2013
    Date of Patent: September 1, 2015
    Assignee: F-Secure Corporation
    Inventors: Paolo Palumbo, Andrew Patel
  • Patent number: 9111094
    Abstract: First data relating to a selected file is obtained. Based upon the first data it is determined if malware detection processing can be selected. Malware detection processing of the file is selected based upon said first data if it is determined that malware detection processing can be selected based upon the first data. If it is determined that, based upon the first data, malware detection processing cannot be selected based upon the first data, second data relating to the selected file is obtained and malware detection processing of the file is selected based upon said first and second obtained data. The selected malware detection processing is applied to said selected file. In an exemplary embodiment the first data is metadata and represents a faster scan of the file, and the second data is content of the file's header and represents a more in-depth scan of the file.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: August 18, 2015
    Assignee: F-Secure Corporation
    Inventors: Pavel Turbin, Jari Lehtonen, Mika Ståhlberg, Kai Nyman, Andrew Patel
  • Publication number: 20150089647
    Abstract: A method of inspecting a file on a client computer in order to determine if the file is malicious. The client computer sends a hash of the file to a server. The server then compares the hash of the file to a database of hashes of known files, and uses results of the comparison to determine whether or not the file is unknown to the server. If the file is unknown, the server sends a request for a first security analysis of the file to the client computer. The client computer then performs the first security analysis on the file, modifies the results of the first security analysis by removing or hashing selected data from results, and sends the modified results of the first security analysis to the server. The server performs a second security analysis on the modified results in order to determine if the file is malicious.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 26, 2015
    Inventors: Paolo PALUMBO, Andrew PATEL
  • Patent number: 8959640
    Abstract: The present invention relates to a method of controlling the download of anti-virus software updates to a device. The device is configured to transmit an update query to a network device requesting information on whether any updates are available for the anti-virus software. When the device receives the response it stores the response in the cache. The cache can then be queried following a trigger and, if the cache indicates an update to the anti-virus software is available the device downloads an update to the anti-virus software. In an alternative embodiment the device may download and install an update upon receiving the response to the query if the response to the query indicates that an update is available. The query may be transmitted during a scan or upon determining a change in a connection at a device.
    Type: Grant
    Filed: March 29, 2012
    Date of Patent: February 17, 2015
    Assignee: F-Secure Corporation
    Inventors: Paolo Palumbo, Andrew Patel
  • Publication number: 20140130165
    Abstract: According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.
    Type: Application
    Filed: November 4, 2013
    Publication date: May 8, 2014
    Applicant: F-Secure Corporation
    Inventors: Andrew PATEL, Igor Afanasiev, Veli-Jussi Kesti, Urmas Rahu, Yury Yakovlev, Jarkko Konola, Janne Pirttilahti
  • Publication number: 20140090055
    Abstract: This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a social media application is detected by the computer security routine. The user input indicates that a user wants to share content with at least one other user through the social media application. In response, the computer security routine suspends said sharing and performs, before determining whether or not to allow the sharing, a security check for suspiciousness of contents the user intends to share.
    Type: Application
    Filed: September 10, 2013
    Publication date: March 27, 2014
    Applicant: F-Secure Corporation
    Inventors: Paolo PALUMBO, Andrew PATEL
  • Publication number: 20140013435
    Abstract: A method of inhibiting the spread of malware across a network of interconnected computer terminals. The method includes detecting malware or suspicious behaviour at a first computer terminal and inspecting the first computer terminal, before and/or after said step of detecting malware or suspicious behaviour, to identify contacts forming part of a social network. Identities of the identified contacts are sent to a backend security system, and at the backend security system, said identities are received and instructions sent to one or more second computer terminals associated with respective identities to cause those second computer terminals to implement an increased level of security.
    Type: Application
    Filed: July 2, 2013
    Publication date: January 9, 2014
    Inventors: Paolo PALUMBO, Andrew PATEL