Patents by Inventor Andrew Patel
Andrew Patel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240132509Abstract: Disclosed are quinoline and quinazoline compounds which modulate the activity of the gated ion channels. Compounds that modulate these gated ion channels are useful in the treatment of diseases and disorders related to pain, inflammation, the neurological system, the gastrointestinal system and genitourinary system. Preferred compounds include quinoline or quinazoline derivatives substituted at the 4-position via N(H), C(O) or O moieties.Type: ApplicationFiled: November 13, 2023Publication date: April 25, 2024Inventors: Nadiya Sydorenko, Md Rauful Alam, Michael A. Arnold, Suresh Babu, Anuradha Bhattacharyya, Guangming Chen, Aleksey I. Gerasyuto, Gary Mitchell Karp, Andrew J. Kassick, Anthony R. Mazzotti, Young-Choon Moon, Jana Narasimhan, Jigar Patel, Anthony Turpoff, Matthew G. Woll, Wuming Yan, Nanjing Zhang
-
Patent number: 11965020Abstract: Antigen binding molecules (ABMs) comprising Fab domains in non-native configurations, ABM conjugates comprising the ABMs and cytotoxic or cytostatic agents, pharmaceutical compositions containing the ABMs and ABM conjugates, methods of using the ABMs, ABM conjugates and pharmaceutical compositions for treating cancer, nucleic acids encoding the ABMs, cells engineered to express the ABMs, and methods of producing ABMs.Type: GrantFiled: May 17, 2023Date of Patent: April 23, 2024Assignee: Regeneron Pharmaceuticals, Inc.Inventors: Tong Zhang, Erica Pyles, Michael Rosconi, Nina Liu, Supriya Patel, Eric Smith, Andrew Murphy, Chia-Yang Lin, Samuel Davis
-
Patent number: 11962030Abstract: An integrated, unitary battery pack may be formed and used as part of the structural support for a vehicle frame. The unitary battery pack includes arrays cells having all positive and negative electrical terminals aligned in-plane on a common face of the product assembly. The unitary battery pack includes cooling components for passively or actively cooling the cell arrays. The unitary battery pack is encased in a potting material that allows that forms part of the structure support for the unitary battery pack. The unitary batter pack may be integrated into the vehicle with or without additional support structures.Type: GrantFiled: November 20, 2020Date of Patent: April 16, 2024Assignee: Tesla, Inc.Inventors: Andrew Pires, Robert David Sumpf, Jr., William B. Stockton, Cole Spooner, Cole Prodan, Jayesh Bharat Gorasia, Kenton Harris, Dan Burke, Dafna Gabriela Szafer, Krupal Patel, Benjamin Parker, David Elias Hegeman
-
Patent number: 11949294Abstract: An assembly comprises a resistor plate for a rotating rectifier assembly (RRA). A shaft bore is defined through the resistor plate for passage of a shaft of an electrical machine, and the resistor plate defines a main annular body around the shaft bore. A first protrusion extends radially outward from the main annular body, so that a first pin bore extends through the first protrusion. At least one contact band is seated in a the pin bore of the resistor plate for mounting a direct current (DC) pin to the resistor plate.Type: GrantFiled: March 13, 2021Date of Patent: April 2, 2024Assignee: Hamilton Sundstrand CorporationInventors: Kyle S. Sirbasku, Dhaval Patel, Andrew R. Wilkinson, Mary Christelle Ann Calacal, Yaser J. Isa, Edward C. Allen, Duane C. Johnson
-
Patent number: 11949659Abstract: A first packet of a packet flow is received at a classifying network device. The first packet is forwarded from the classifying network device to a firewall network device. An indication that the packet flow is to be offloaded is received at the classifying network device. Data is stored at the classifying network device indicating that the packet flow is to be offloaded. A non-control packet of the packet flow is received at the classifying network device. A determination is made that the non-control packet belongs to the packet flow by comparing data contained in the non-control packet to the stored data. The non-control packet of the packet flow is directed to a processing entity in response to the determining. A control packet of the packet flow is received at the classifying network device. The control packet of the packet flow is directed to the firewall network device.Type: GrantFiled: July 13, 2021Date of Patent: April 2, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Pradeep Patel, Jonathan A. Kunder, Ashish K. Dey, Andrew E. Ossipov, Jianxin Wang
-
Patent number: 11949276Abstract: A system describing Unlimited Range Drive capabilities of electric vehicles using machine learning techniques, assisted by intelligent battery modules and high voltage continuous variable power plant, the intelligent battery and power plant modules work in harmony and continuously provide feedback to each other, causing a battery to recharge while the other is in use to drive, this charging/recharging process and dynamically switching battery in use is continued until physical life of batteries is exhausted approximately 10 to 15 years, dynamic coordination of modules with dynamic switching of batteries, achieves unlimited range drive capabilities which may exceed 1 million mile drive on a single high voltage battery charge, the system provides clean environment and cost effective solution, this platform can be implemented in larger chassis including, but not limited to light duty trucks and vans up to heavy duty cargo tractor trailer and commercial public transportation buses.Type: GrantFiled: August 21, 2021Date of Patent: April 2, 2024Inventors: Mitul M Patel, Michael Andrew Generallo, Luna Yaisi Manuel
-
Publication number: 20240105319Abstract: A system can include a location data module configured to receive location data, the location data including patient location information associated with a plurality patients and care team member location information associated with one or more care team members, and a route module operatively connected to the location data module and configured to determine a visitation route for each of the one or more care team members to visit the plurality of patients based on the location data.Type: ApplicationFiled: September 28, 2023Publication date: March 28, 2024Applicant: AndorHealth, LLCInventors: Maha Ahmed, William Beamer, Sonali Carumbaya, Lauren Cuppy, Declan Fortune, Jack Gilmore, Siddarth Kasi, Neha Mahmood, Nishanth Reddy, Chanakya Toleti, Chandini Toleti, Kalyan Toleti, Tatiana Vallejo, Andrew Langford, Pritesh Patel, Balavignesh Thirumalainambi, Srini Surendranath, Raj Toleti
-
Publication number: 20240096461Abstract: An inbound message including medical record content may be received. The inbound message may indicate a healthcare entity and a vendor entity. It may be determined, from the healthcare entity and stored correspondences between medical record formats and healthcare entities, that the medical record content of the inbound message is in a first medical record format. Which configuration record of stored configuration records specifying combinations of sets of rules may be determined to apply as a translation to the inbound message based upon the medical record content of the inbound message and the first medical record format. The sets of rules as indicated by the configuration record may be accessed and applied to the inbound message to translate the medical record content in the inbound message from the first medical record format to the standardized format. The standardized format may be transmitted to the vendor entity.Type: ApplicationFiled: November 29, 2023Publication date: March 21, 2024Inventors: James Lloyd, Christopher Tobin-Campbell, Andrew Kitson, Nicholas Hatt, Nijay Patel
-
Patent number: 11923718Abstract: Our system describes Unlimited Range Drive (URD) capabilities of an electrical automotive vehicle using machine learning technique, assisted by newly designed intelligent battery modules (IBM-R, IBM-D/R) and newly invented high voltage continuous variable power plant (CVPP), our intelligent battery and power plant modules work in harmony and continuously provide feedback to each other, causing a high voltage battery to recharge while other high voltage battery is in use to drive a vehicle, this charging/recharging process and dynamically switching high voltage battery in use is continued until physical life of batteries is exhausted which may be 10 to 15 years, dynamic coordination of the modules with dynamic switching of battery in use archives Unlimited Range Drive (URD) capabilities which may exceed more than 1 million miles drive on a single high voltage battery charge, our URD system provides clean environment and cost effective more than 1 million miles drive solution.Type: GrantFiled: May 3, 2021Date of Patent: March 5, 2024Inventors: Mitul M Patel, Michael Andrew Generallo, Luna Yaisi Manuel
-
Patent number: 11032313Abstract: There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily include identification of an electronic file to be scanned for malware, generation of at least one scanning object of the identified electronic file on the basis of a dynamic configuration by a remote entity, said at least one scanning object being generated by using malware-susceptible data of the identified electronic file and neglecting malware-insusceptible data of the identified electronic file, transfer of the at least one scanning object of the identified electronic file for remote malware scanning to the remote entity, and execution of a malware scan of the at least one scanning object of the electronic file at the remote entity by a malware scanning engine or application.Type: GrantFiled: February 18, 2016Date of Patent: June 8, 2021Assignee: F-Secure CorporationInventors: Juha Ylipekkala, Jammu Kekkonen, Andrew Patel, Jarno Niemela, Jari Savander, Jani Jappinen, Juho Heikkinen, Zimry Ong
-
Publication number: 20160248786Abstract: There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily comprise include identification of an electronic file to be scanned for malware, generation of at least one scanning object of the identified electronic file on the basis of a dynamic configuration by a remote entity, said at least one scanning object being generated by using malware-susceptible data of the identified electronic file and neglecting malware-insusceptible data of the identified electronic file, transfer of the at least one scanning object of the identified electronic file for remote malware scanning to the remote entity, and execution of a malware scan of the at least one scanning object of the electronic file at the remote entity by a malware scanning engine or application.Type: ApplicationFiled: February 18, 2016Publication date: August 25, 2016Inventors: Juha YLIPEKKALA, Jammu Kekkonen, Andrew PATEL, Jarno NIEMELA, Jari SAVANDER, Jani JAPPINEN, Juho HEIKKINEN, Zimry ONG
-
Patent number: 9392014Abstract: This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a social media application is detected by the computer security routine. The user input indicates that a user wants to share content with at least one other user through the social media application. In response, the computer security routine suspends said sharing and performs, before determining whether or not to allow the sharing, a security check for suspiciousness of contents the user intends to share.Type: GrantFiled: September 10, 2013Date of Patent: July 12, 2016Assignee: F-Secure CorporationInventors: Paolo Palumbo, Andrew Patel
-
Patent number: 9231971Abstract: According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.Type: GrantFiled: November 4, 2013Date of Patent: January 5, 2016Assignee: F-Secure CorporationInventors: Andrew Patel, Igor Afanasiev, Veli-Jussi Kesti, Urmas Rahu, Yury Yakovlev, Jarkko Konola, Janne Pirttilahti
-
Patent number: 9124617Abstract: A method of inhibiting the spread of malware across a network of interconnected computer terminals. The method includes detecting malware or suspicious behavior at a first computer terminal and inspecting the first computer terminal, before and/or after said step of detecting malware or suspicious behavior, to identify contacts forming part of a social network. Identities of the identified contacts are sent to a backend security system, and at the backend security system, said identities are received and instructions sent to one or more second computer terminals associated with respective identities to cause those second computer terminals to implement an increased level of security.Type: GrantFiled: July 2, 2013Date of Patent: September 1, 2015Assignee: F-Secure CorporationInventors: Paolo Palumbo, Andrew Patel
-
Patent number: 9111094Abstract: First data relating to a selected file is obtained. Based upon the first data it is determined if malware detection processing can be selected. Malware detection processing of the file is selected based upon said first data if it is determined that malware detection processing can be selected based upon the first data. If it is determined that, based upon the first data, malware detection processing cannot be selected based upon the first data, second data relating to the selected file is obtained and malware detection processing of the file is selected based upon said first and second obtained data. The selected malware detection processing is applied to said selected file. In an exemplary embodiment the first data is metadata and represents a faster scan of the file, and the second data is content of the file's header and represents a more in-depth scan of the file.Type: GrantFiled: January 21, 2011Date of Patent: August 18, 2015Assignee: F-Secure CorporationInventors: Pavel Turbin, Jari Lehtonen, Mika Ståhlberg, Kai Nyman, Andrew Patel
-
Publication number: 20150089647Abstract: A method of inspecting a file on a client computer in order to determine if the file is malicious. The client computer sends a hash of the file to a server. The server then compares the hash of the file to a database of hashes of known files, and uses results of the comparison to determine whether or not the file is unknown to the server. If the file is unknown, the server sends a request for a first security analysis of the file to the client computer. The client computer then performs the first security analysis on the file, modifies the results of the first security analysis by removing or hashing selected data from results, and sends the modified results of the first security analysis to the server. The server performs a second security analysis on the modified results in order to determine if the file is malicious.Type: ApplicationFiled: September 25, 2014Publication date: March 26, 2015Inventors: Paolo PALUMBO, Andrew PATEL
-
Patent number: 8959640Abstract: The present invention relates to a method of controlling the download of anti-virus software updates to a device. The device is configured to transmit an update query to a network device requesting information on whether any updates are available for the anti-virus software. When the device receives the response it stores the response in the cache. The cache can then be queried following a trigger and, if the cache indicates an update to the anti-virus software is available the device downloads an update to the anti-virus software. In an alternative embodiment the device may download and install an update upon receiving the response to the query if the response to the query indicates that an update is available. The query may be transmitted during a scan or upon determining a change in a connection at a device.Type: GrantFiled: March 29, 2012Date of Patent: February 17, 2015Assignee: F-Secure CorporationInventors: Paolo Palumbo, Andrew Patel
-
Publication number: 20140130165Abstract: According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.Type: ApplicationFiled: November 4, 2013Publication date: May 8, 2014Applicant: F-Secure CorporationInventors: Andrew PATEL, Igor Afanasiev, Veli-Jussi Kesti, Urmas Rahu, Yury Yakovlev, Jarkko Konola, Janne Pirttilahti
-
Publication number: 20140090055Abstract: This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a social media application is detected by the computer security routine. The user input indicates that a user wants to share content with at least one other user through the social media application. In response, the computer security routine suspends said sharing and performs, before determining whether or not to allow the sharing, a security check for suspiciousness of contents the user intends to share.Type: ApplicationFiled: September 10, 2013Publication date: March 27, 2014Applicant: F-Secure CorporationInventors: Paolo PALUMBO, Andrew PATEL
-
Publication number: 20140013435Abstract: A method of inhibiting the spread of malware across a network of interconnected computer terminals. The method includes detecting malware or suspicious behaviour at a first computer terminal and inspecting the first computer terminal, before and/or after said step of detecting malware or suspicious behaviour, to identify contacts forming part of a social network. Identities of the identified contacts are sent to a backend security system, and at the backend security system, said identities are received and instructions sent to one or more second computer terminals associated with respective identities to cause those second computer terminals to implement an increased level of security.Type: ApplicationFiled: July 2, 2013Publication date: January 9, 2014Inventors: Paolo PALUMBO, Andrew PATEL