Patents by Inventor Ankit
Ankit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250149040Abstract: A method for Ultra-Wide Band (UWB) based voice assistance to a user by an electronic device is provided. The method includes monitoring over time, by the electronic device, interactions between objects in an environment using at least one UWB sensor of the electronic device, determining, by the electronic device, at least one task and an associated objective of the at least one task corresponding to the monitored interactions, generating, by the electronic device, a semantic description of the at least one task and the associated objective in a natural language (NL) for each object, and providing, by the electronic device, the voice assistance to the user based on the semantic description in the natural language.Type: ApplicationFiled: January 13, 2025Publication date: May 8, 2025Inventors: Ankit JAIN, Siba Prasad SAMAL, Mridul GUPTA
-
Publication number: 20250149239Abstract: A provided wireless wallbox dimmer may accommodate a plurality of button configurations. The dimmer may be configured to contain a variable number of controllably conductive devices. The dimmer may include a yoke that defines a first plane and an antenna that defines a second plane that is substantially parallel to and spaced apart from the first plane. The yoke may have a flange that is oriented angularly offset relative to the first plane and provides a plurality of mounting locations for controllably conductive devices. The antenna may provide the dimmer with a first wireless transmission range. The dimmer may include a faceplate that cooperates with the antenna to provide the dimmer with a second wireless transmission range that is broader than the first wireless transmission range. The dimmer may include a button assembly that is supported independently of the yoke.Type: ApplicationFiled: January 7, 2025Publication date: May 8, 2025Applicant: Lutron Technology Company LLCInventors: Ankit Bhutani, Nikhil Vithal Bhate, William Taylor Shivell, Sean R. Pearson
-
Publication number: 20250151047Abstract: The techniques described herein may include solutions for using downlink control information (DCI) to indicate dormancy for secondary cells (SCells). For DCI without a specific field for indicating dormancy for SCells, one or more fields of the DCI may be repurposed to report SCell dormancy. Repurposed fields may be arranged according to radio resource control (RRC) configuration information, a most significant bit (MSB), a least significant bit (LSB), and/or one or more bits being directed to specific SCell dormancy with one or more other bits being directed to SCell group dormancy, subsets of SCells, and/or a pre-defined rule. These and many other features and examples are described herein.Type: ApplicationFiled: October 31, 2024Publication date: May 8, 2025Inventors: Ankit BHAMRI, Haitong SUN, Wei ZENG, Dawei ZHANG, Sigen YE, Huaning NIU, Chunxuan YE
-
Publication number: 20250148882Abstract: Information-security LoRa-wave sensing is used to protect ATMs with LoRa modulator with spread-spectrum modulation techniques and/or transparent laser-guided systems 3D image generation to scan/monitor ATM card slots and ATM keypads for skimmers, fake keypads, etc. Sensor(s) with a DCNN/StNet-based algorithm are trained on 3D dimensions for card slot and keypad. Normal vs. detected constant weight of the keypad as well as weight distribution when keys are depressed are detected. Normal vs. disrupted signals based on the foregoing are observed and used to detect unauthorized objects. NB-IoT LoRa-waves initiate an alarm process. Additional features, functionality, and details are disclosed.Type: ApplicationFiled: December 30, 2024Publication date: May 8, 2025Inventors: Nimish Ravindra Deshpande, Yash Misra, Suman Boroi Tamuly, Harender Dass, Prashant Bidkar, Ankit Upadhyaya
-
Publication number: 20250150985Abstract: Techniques are provided for a network-controlled repeater (NCR) to share power during the simultaneous transmission of a control link and backhaul link. When the total power for transmitting via the control link and the backhaul link are below a maximum power for transmission, the NCR can use the calculated transmission powers for transmitting each link. Otherwise, the NCR can apply a relative priority to the links, a default priority to each link, a stepwise reduction of power, or a power sharing factor. A power sharing technique can be based on whether there is overlap between the links on the same time symbol, where the same or different beams are used for each link, and/or whether a priority flag for an access link is being used. These and many other features and examples are described.Type: ApplicationFiled: October 31, 2024Publication date: May 8, 2025Inventors: Ankit BHAMRI, Hong HE, Wei ZENG, Haitong SUN, Dawei ZHANG, Weidong YANG, Oghenekome OTERI
-
Publication number: 20250150798Abstract: Device information may be obtained using LoRaWAN communications. A device information request may be generated and transmitted by a user device and include request parameters such as a device type for which information is desired, a type of information requested, a geographic range for the request, and the like and/or combinations thereof. Device information requests may also be propagated or repeated by intermediary devices to achieve the desired request range. Accordingly, a recipient device of the original request may propagate or repeat, using LoRaWAN, a request signal if it determines that the request range has not been met. If the request range has been met, the recipient device might not repeat the request.Type: ApplicationFiled: January 13, 2025Publication date: May 8, 2025Inventors: Prashant Anna Bidkar, Ankit Upadhyaya, Prashant Khare, Suman Boroi Tamuly, Harmeet Singh, Bharat Indrakanti
-
Publication number: 20250151023Abstract: Various aspects of the disclosure relate to sidelink positioning reference signal (PRS) processing. A configuring device transmits a request message requesting sidelink PRS processing capability of a responding device, and receive a response message indicating the sidelink PRS processing capability. The configuring device can configure a sidelink PRS configuration indicating a duration and priority associated with processing a sidelink PRS with respect to an additional sidelink signal received by the responding device, and transmit the sidelink PRS configuration to the responding device. The responding device can receive the request message to indicate the sidelink PRS processing capability of the device, and transmit the response message indicating the sidelink PRS processing capability.Type: ApplicationFiled: February 3, 2023Publication date: May 8, 2025Applicant: Lenovo (Singapore) Pte. LimitedInventors: Robin Rajan Thomas, Karthikeyan Ganesan, Abir Ben Hadj Fredj, Colin Frank, Ankit Bhamri, Ali Ramadan Ali
-
Publication number: 20250151088Abstract: An apparatus includes a receiver configured to receive, from a base station, a control message indicating a sidelink resource pool. The apparatus further includes a transmitter configured to perform, after receiving the control message, a sidelink transmission using one or more sidelink resources. Based on a speed exceeding a threshold speed, the one or more sidelink resources include one of a first sidelink resource of the sidelink resource pool or a preconfigured sidelink resource. The one or more sidelink resources include the first sidelink resource based on the first sidelink resource being associated with a high speed flag. The one or more sidelink resources include the preconfigured sidelink resource based on a time interval since a previous sidelink transmission failing to exceed a threshold time interval and further based on the sidelink resource pool failing to indicate a resource associated with the high speed flag.Type: ApplicationFiled: April 28, 2022Publication date: May 8, 2025Inventors: Chunxia Li, Matthew Heng Zhang, Rajat Kapur, Yuyu Yan, Liang Zhu, Hua Xu, Feng Chen, Ankit Gothi
-
Publication number: 20250150480Abstract: A method, system, or apparatus for mitigating computer and network security deficiencies is provided in which, the method, system, or apparatus scans computer system components for finding a vulnerability, generates a Vulnerability Priority Scoring System (VPSS) score for the vulnerability based on the vulnerability, develops a vulnerability mitigation policy based on a system state comprising the VPSS score, wherein the vulnerability mitigation policy provides a best action for mitigating the vulnerability selected among one or more trained possible actions by a deep neural network, and performs the vulnerability mitigation policy based on the best action. Other aspects, embodiments, and features are also claimed and described.Type: ApplicationFiled: September 6, 2024Publication date: May 8, 2025Inventor: Ankit Shah
-
Patent number: 12292963Abstract: Applications can be automatically grouped in a secure workspace environment. An application organizer service can be deployed on a user computing device to intelligently group applications within secure workspaces based on resource requirements, peripheral usage, threat level and/or data sharing characteristics of the applications. The application organizer service may determine these characteristics in a variety of ways including through the monitoring of the applications as they execute inside the secure workspaces.Type: GrantFiled: November 1, 2022Date of Patent: May 6, 2025Assignee: Dell Products L.P.Inventors: Gokul Thiruchengode Vajravel, Srinivasa Ragavan Rajagopalan, Ankit Kumar
-
Patent number: 12295084Abstract: A device may detect a power removal event, determine whether the power removal event is a local power removal event or a system power removal event, and perform state correction. For example, the device may receive an indication of a state change event turning on the lighting device. The indication may be received from a sensor. For example, the sensor may include a photosensing circuit (e.g., capable of detecting light emission from the lighting device) or the sensor may include a live voltage sensor (e.g., capable of detecting a change in current driven to the lighting device). The device may then determine whether the power removal event is a system power removal event or a local power removal event. If the device determines that the power removal event is a system power removal event, the device may perform state correction (e.g., setting the lighting device to its state prior to the power removal event).Type: GrantFiled: October 25, 2023Date of Patent: May 6, 2025Assignee: Lutron Technology Company LLCInventors: Ankit Bhutani, Matthew Knauss, Timothy Mann, Michael W. Pessina, David T. Saveri, III, Matthew J. Swatsky
-
Patent number: 12293206Abstract: The present disclosure relates to systems, methods, and computer-readable media for receiving usage data for a virtual device (or other virtual service), analyzing the usage data to determine a usage bucket characteristic of usage of the virtual device over a period of time, and determining a usage score for the virtual device. The systems described herein further involve causing a deployment of the virtual device to be upgraded, downgraded, or otherwise modified based on the usage bucket and associated usage score. The features and functionalities described herein can provide an efficient mechanism for administrating a tenant deployment as well as implementing a more efficient utilization of cloud computing resources for a variety of virtual services.Type: GrantFiled: December 6, 2021Date of Patent: May 6, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Hu Lu, XiWen Yue, Lingxiao Hang, Haiyang Wang, Ankit Srivastava, Fan Yin, Naga Venkata Rajagopal Ramadugu, Nandita Sharma, Jyh-Han Lin, Sandeep Patnaik
-
Patent number: 12293170Abstract: Described is a technique for securing a private secret key during a software build process for a software development kit (SDK) that includes a code implementation for an application programming interface (API), where the private secret key is for use in signing the payload of an API request for the API. Consistent with examples, a keychain service stores a private secret key. In at least one source code file for a SDK, the source code includes a macro definition, which, upon executing by a compiler, obtains a value for the private secret key. In a programming shell environment, a shell script is executed. Execution of the shell script results in executing a nested script, which queries the keychain service for the private secret key.Type: GrantFiled: May 10, 2023Date of Patent: May 6, 2025Assignee: Snap Inc.Inventors: Frederik Van Voorden, Aaron Wangugi, Ankit Sultania
-
Patent number: 12294964Abstract: This application relates to wireless communications, including methods and apparatus to manage uplink (UL) transmit switching with multiple timing advance groups (TAGs) for wireless devices. A wireless device is configured to select N?2 radio frequency carriers for UL transmission from M>N available radio frequency carriers and subsequently send UL transmissions to a cellular wireless network based on the configuration. The M available radio frequency carriers are divided into distinct TAGs, each TAG having a distinct timing advance value, and the N radio frequency carriers belong to a single TAG. The wireless device is further configured to switch to a second set of N UL radio frequency carriers, after an uplink switching gap time period, based on a TAG medium access control (MAC) control element (CE), received the cellular wireless network, which specifies a second TAG from which to select the second set of N UL radio frequency carriers.Type: GrantFiled: July 20, 2022Date of Patent: May 6, 2025Assignee: Apple Inc.Inventors: Ankit Bhamri, Dawei Zhang, Sigen Ye, Wei Zeng, Yang Tang
-
Publication number: 20250141967Abstract: A control device may be configured to delay an attachment procedure while attachment messages are being transmitted over the network. The control device may be configured to initiate an attachment procedure with a router device on a network at the end a back-off period of time. The attachment procedure may include transmitting attachment messages (e.g., parent request messages) that enable the control device to transmit and receive messages over the network through the router device. During the back-off period of time, the control device may determine an attachment message is received from another control device on the network. And, if an attachment message (e.g., a parent request messages and/or a link request message) is received from another control device, the control device may increase the back-off period of time (e.g., delaying when the control device initiates its attachment procedure).Type: ApplicationFiled: January 7, 2025Publication date: May 1, 2025Applicant: Lutron Technology Company LLCInventors: Ankit Bhutani, Vidur Garg, Jeffrey S. Hayes, Galen Edgar Knode
-
Publication number: 20250142394Abstract: Apparatuses, methods, and systems are disclosed for configuring an AI based framework. One method includes receiving, an indication indicating an artificial intelligence based framework. The method includes receiving configuration information corresponding to the artificial intelligence based framework. The configuration information comprises at least one parameter of the artificial intelligence based framework. The method includes communicating an artificial intelligence report corresponding to the artificial intelligence based framework based on the configuration information. The artificial intelligence report includes: a set of values corresponding to the configuration information; an indication of a subset of a set of channel resources; or a combination thereof. The artificial intelligence report corresponds to a usage value that describes an artificial intelligence based application.Type: ApplicationFiled: January 3, 2025Publication date: May 1, 2025Inventors: Ahmed Hindy, Ankit Bhamri, Vijay Nangia
-
Publication number: 20250136142Abstract: Systems, methods, and non-transitory computer readable mediums are provided for detecting traffic lights in images based on prompts that automatically limit the search space within the images for the traffic lights. For example, a system may receive image data and prompt data identifying a search space for traffic light detection. Additionally, the system may generate layout data based on the prompt data and generate traffic light data based on the image data and the layout data. Moreover, the system may determine state information for one or more first traffics included in the image data based on the traffic light data. Further, the system may implement one or more operations associated with a navigation and routing system of the autonomous vehicle based on the state information.Type: ApplicationFiled: October 25, 2023Publication date: May 1, 2025Inventors: Amirreza Shaban, Ankit Raj, Sachithra Hemachandra
-
Publication number: 20250142139Abstract: The present disclosure generally relates to systems and methods for generating an AD content. In some implementation examples, an AD content system obtains and input audio and an AD narration, and normalizes a loudness of a section of the AD narration using a loudness of the input audio during a scene that the section corresponds to for generating a normalized section. Based on a loudness of the normalized section, the AD content system compresses a first audio channel of the input audio during the scene to generate a first compressed audio channel, and mix the normalized section to the first compressed audio channel during the scene to generate a first sound channel of the AD content.Type: ApplicationFiled: December 11, 2023Publication date: May 1, 2025Inventors: Akash Amol, Ankit Prem Manocha, Mayank Sharma, Ashutosh Singhal, Jayashree Rajagopalan, Ayotomiwa Ajewole
-
Publication number: 20250142291Abstract: Various aspects of the present disclosure relate to a device that receives a request by a location server to query for positioning measurements which are labelled or unlabelled, which is dependent on whether a supervised or unsupervised learning model is used. The requested positioning measurements, each associated with a label, are provided to a training system that trains one or more artificial intelligence (AI) inference models. The one or more AI inference models are deployed to a location management function (LMF), which makes predictions based on subsequent positioning measurements received from the device.Type: ApplicationFiled: February 3, 2023Publication date: May 1, 2025Applicant: LENOVO (SINGAPORE) PTE. LTD.Inventors: Robin Rajan Thomas, Ankit Bhamri
-
Publication number: 20250138027Abstract: Provided herein are methods to predict primary graft dysfunction in a subject, comprising detecting and/or quantifying complement protein in allograft biopsy tissue up to 120 minutes post-reperfusion.Type: ApplicationFiled: October 30, 2024Publication date: May 1, 2025Applicant: Northwestern UniversityInventor: Ankit BHARAT