Patents by Inventor Ankur Jain

Ankur Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160272485
    Abstract: A device may comprise a substrate formed of a first semiconductor material and a trench formed in the substrate. A second semiconductor material may be formed in the trench. The second semiconductor material may have first and second portions that are isolated with respect to one another and that are isolated with respect to the first semiconductor material.
    Type: Application
    Filed: May 26, 2016
    Publication date: September 22, 2016
    Inventors: Ankur JAIN, Roman C. GUTIERREZ, Shi-Sheng LEE, Robert J. CALVET, Xiaolei LIU
  • Patent number: 9449526
    Abstract: In some implementations, one or more words from a digital work are used to generate a game to be displayed on an electronic device. For example, the electronic device may include a library of one or more digital works. A word or knowledge game may be dynamically generated based on objects, such as characters, topics, places, organizations, things, etc., identified in at least one digital work in the library. As one example, a crossword puzzle may be created to include words and clues based at least in part on the objects identified in at least one digital work and supplemental information associated with the objects. The clues for the crossword puzzle may be generated automatically based, at least in part, on a desired level of difficulty. Further, in some cases, the game may be generated from words drawn from multiple digital works in the library.
    Type: Grant
    Filed: March 19, 2012
    Date of Patent: September 20, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Walter Manching Tseng, Adam J. Iser, Michel L. Goldstein, Ravi Shankar Thangavel, Janna S. Hamaker, Ankur Jain
  • Patent number: 9430014
    Abstract: Various embodiments of methods and systems for idle state optimization in a portable computing device (“PCD”) are disclosed. An exemplary method includes comparing an aggregate power consumption level for all processing cores in the PCD to a power budget and, if there is available headroom in the power budget, transitioning cores operating in a first idle state to a different idle state. In doing so, the latency value associated with bringing the transitioned cores out of an idle state and into an active state, should the need arise, may be reduced. The result is that user experience and QoS may be improved as an otherwise idle core in an idle state with a long latency time may be better positioned to quickly transition to an active state and process a workload.
    Type: Grant
    Filed: July 18, 2013
    Date of Patent: August 30, 2016
    Assignee: QUALCOMM INCORPORATED
    Inventors: Ankur Jain, Unnikrishnan Vadakkanmaruveedu, Vinay Mitter, Henri Begin, Praveen Chidambaram
  • Publication number: 20160234015
    Abstract: A secure secrets proxy is instantiated in a first computing environment and includes secure secrets proxy authentication data for identifying itself to a secrets distribution management system in a second computing environment as a trusted virtual asset to receive and cache secrets data in a secure secrets cache outside the second computing environment. A virtual asset requests one or more secrets, triggering a process to authenticate the requesting virtual asset, gathering authorized secrets data representing secrets the virtual asset is allowed to have. The secure secrets proxy is provided data representing the requested secrets and stores that secrets data in the secure secrets cache of the proxy.
    Type: Application
    Filed: April 20, 2016
    Publication date: August 11, 2016
    Applicant: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
  • Patent number: 9390288
    Abstract: Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data.
    Type: Grant
    Filed: November 1, 2013
    Date of Patent: July 12, 2016
    Assignee: Intuit Inc.
    Inventors: Oleg Gryb, Jinglei Whitehouse, Elangovan Shanmugam, Ankur Jain, III, Mark Basler, M. Shannon Lietz, Sabu Kuruvila Philip, Luis Felipe Cabrera, Thomas Bishop
  • Patent number: 9384362
    Abstract: Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data.
    Type: Grant
    Filed: October 14, 2013
    Date of Patent: July 5, 2016
    Assignee: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
  • Publication number: 20160192121
    Abstract: The present disclosure provides a method for exchanging contact information, comprising detecting a first exchange event on a first mobile electronic device of a first user and initiating the exchange of contact information between the first mobile electronic device and a second mobile electronic device of another user that has detected a second exchange event. Next, contact information of the first user is transmitted from the first mobile electronic device to the second mobile electronic device and contact information of the second user is received at the first mobile electronic device.
    Type: Application
    Filed: October 14, 2015
    Publication date: June 30, 2016
    Inventors: Ankur JAIN, Ian MURRAY, Daniel O'SHEA, Kevin LINDKVIST, Joe DAO, Clara ZAVANI, Ryan MICK, John ULLMAN, Arielle ZUCKERBERG, Mijail GOMEZ, James MCERLAIN, Sinan ARAL, Purshotam RAJANI, David WYLER
  • Patent number: 9360907
    Abstract: Various embodiments of methods and systems for adaptive thermal management techniques implemented in a portable computing device (“PCD”) are disclosed. Notably, in many PCDs, temperature thresholds associated with various components in the PCD such as, but not limited to, die junction temperatures, package on package (“PoP”) memory temperatures and the “touch temperature” of the external surfaces of the device itself limits the extent to which the performance capabilities of the PCD can be exploited. It is an advantage of the various embodiments of methods and systems for adaptive thermal management that, when a temperature threshold is violated, the performance of the PCD is sacrificed only as much and for as long as necessary to clear the violation before authorizing the thermally aggressive processing component(s) to return to a maximum operating power.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: June 7, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Paras S. Doshi, Ankur Jain, Unnikrishnan Vadakkanmaruveedu, Vinay Mitter, Anil Vootukuru, Ronald F. Alton, Jon J. Anderson
  • Patent number: 9352962
    Abstract: A device may comprise a substrate formed of a first semiconductor material and a trench formed in the substrate. A second semiconductor material may be formed in the trench. The second semiconductor material may have first and second portions that are isolated with respect to one another and that are isolated with respect to the first semiconductor material.
    Type: Grant
    Filed: November 15, 2010
    Date of Patent: May 31, 2016
    Assignee: DigitalOptics Corporation MEMS
    Inventors: Ankur Jain, Roman C. Gutierrez, Shi-Sheng Lee, Robert J. Calvet, Xiaolei Liu
  • Patent number: 9341520
    Abstract: Various embodiments of methods and systems for estimating environmental ambient temperature of a portable computing device (“PCD”) from electrical resistance measurements taken voice coils in a speaker or microphone component are disclosed. In an exemplary embodiment, it may be recognized that the PCD is in an idle state, thus producing little or no thermal energy. Electrical resistance measurements are taken from a voice coil and used to estimate the environmental ambient temperature to which the PCD is exposed. Certain embodiments may simply render the estimated ambient temperature for the benefit of the user or use the estimated ambient temperature as an input to a program or application running on the PCD. It is envisioned that certain embodiments of the systems and methods may use the estimated ambient temperature to adjust temperature thresholds in the PCD against which thermal management policies govern thermally aggressive processing components.
    Type: Grant
    Filed: June 16, 2013
    Date of Patent: May 17, 2016
    Assignee: QUALCOMM INCORPORATED
    Inventors: Unnikrishnan Vadakkanmaruveedu, Zenghui Zhao, Vinay Mitter, Roy Silverstein, Ankur Jain, Jon Anderson
  • Publication number: 20160125451
    Abstract: Techniques are disclosed for improving electronic communications or so-called posts prior to publication by automatically providing asset suggestions. The techniques generally leverage known historical performance data of rich media “assets” such as image content, graphics content, video content, and audio content. In operation, an asset repository is searched to identify a set of candidate assets that match keywords extracted from a proposed post. The identified candidate assets are ranked based on their performance in one or more target user segments associated with the target audience of post. The post can then be modified to include one or more of the ranked assets. In one example case, the ranked assets are provided to the user, so that the user can select one or more of the ranked assets for incorporation into the post.
    Type: Application
    Filed: November 4, 2014
    Publication date: May 5, 2016
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventors: Mohit Garg, Ankur Jain
  • Publication number: 20160112457
    Abstract: One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken.
    Type: Application
    Filed: December 15, 2015
    Publication date: April 21, 2016
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Barry J. Nisly, Ted R. Neher, III, Javier Godinez, Ankur Jain
  • Publication number: 20160104069
    Abstract: Techniques are disclosed for automatically detecting anomalies in the content of a scheduled social media post, alerting a user to the presence of such anomalies before the content is posted and recommending a course of action when an anomaly is detected. A set of keywords is extracted from a scheduled post using an ontological classification technique. At predetermined time intervals, the keywords are compared with information obtained from one or more data sources to determine if an anomaly is present. If an anomaly is detected, the scheduled post is classified into one of at least three categories: supporting the post, neutral, or opposing the post. Once the anomaly is detected and the scheduled post is classified, the author of the post is alerted to the anomaly along with the categorization. Subsequently, the author may reschedule the post to an earlier or later time, delete the post, or change the post.
    Type: Application
    Filed: October 14, 2014
    Publication date: April 14, 2016
    Applicant: Adobe Systems Incorporated
    Inventors: Mohit Garg, Pawan Goyal, Ankur Jain, Vivek Kumar
  • Patent number: 9310139
    Abstract: An apparatus for managing heat generated by at least one electronic component of a mobile device, the apparatus comprising: a housing for containing the electronic component of the mobile device; and a vapor chamber arranged in the housing, the vapor chamber having a cavity defined by a front wall and a rear wall opposite the rear wall, the front wall for receiving heat generated by the electronic component of the mobile device to evaporate fluid in the cavity into a vapor, the rear wall for receiving the vapor to allow the vapor to condense to liquid thereby cooling the rear wall of the vapor chamber; wherein an outer surface of the housing comprises at least a portion of the rear wall of the vapor chamber.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: April 12, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Unnikrishnan Vadakkanmaruveedu, Mulugeta K. Berhe, Vinay Mitter, Ankur Jain, Paras S. Doshi
  • Patent number: 9246935
    Abstract: One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken.
    Type: Grant
    Filed: October 14, 2013
    Date of Patent: January 26, 2016
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Barry J. Nisly, Ted R. Neher, III, Javier Godinez, Ankur Jain
  • Patent number: 9208224
    Abstract: A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy.
    Type: Grant
    Filed: May 18, 2015
    Date of Patent: December 8, 2015
    Assignee: International Business Machines Corporation
    Inventors: Sumana S. Bhat, Karen L. B. Brown, Ankur Jain, Bipin K. Joshi, Biplav Srivastava, Srikanth G. Tamilselvam, Terrence E. White
  • Patent number: 9154367
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving a plurality of requests from a plurality of client devices sent to a public internet protocol address; routing the requests to one or more internal Internet protocol addresses, where the one or more internal Internet protocol addresses correspond to one or more compute nodes, and where the one or more compute nodes process the routed requests; determining a particular compute node is offline, where the particular compute node is assigned one or more internal Internet protocol addresses; in response to the determination that the particular node is offline, reassigning the one or more internal Internet protocol addresses corresponding to the particular compute node to one or more different compute nodes, where requests communicated to the reassigned internal Internet protocol addresses are communicated to the one or more different compute nodes for processing.
    Type: Grant
    Filed: December 27, 2011
    Date of Patent: October 6, 2015
    Assignee: Google Inc.
    Inventors: Leonidas Kontothanassis, Paul Schultz, David Presotto, Ankur Jain
  • Publication number: 20150281066
    Abstract: An autonomous network and a corresponding routing method include determining routing paths by a controller, and providing the determined routing paths to a data packet processor located remotely from the controller. The data packet processor routes outgoing data packets, based on information from the controller, through a plurality of switches remotely from the data packet processor. Each switch includes a plurality of network interfaces. For an outgoing data packet, the data packet processor determines a network interface over which to transmit the data packet, and adds an indication of the determined network interface in a header of the data packet. The data packet processor forwards the modified data packet to the switch including the determined network interface. The switch identifies the network interface based on the indication, and transmits the outgoing data packet over the identified network interface.
    Type: Application
    Filed: September 5, 2014
    Publication date: October 1, 2015
    Inventors: Bikash Koley, Steven Padgett, Ankur Jain, Arjun Singh, Amin Vahdat, Mahesh Kallahalla, Mukarram Tariq
  • Publication number: 20150281317
    Abstract: Systems and methods are disclosed for requesting media content segments via multiple network connections. In one implementation, a processing device requests, via a first network connection, a sequential transfer of a first media content segment in a first direction. The processing device requests, via a second network connection, a sequential transfer of the first media content segment in a second direction. The processing device requests, based on a determination that the first media content segment has been received, from at least one of the first network connection or the second network connection, a second media content segment.
    Type: Application
    Filed: March 11, 2015
    Publication date: October 1, 2015
    Inventors: Hao Du, Andreas Terzis, Ankur Jain
  • Publication number: 20150264105
    Abstract: Techniques are disclosed for automatically constructing a human-friendly and meaningful URL based on the content, context, or both, of the resource. An alternate URL can be constructed by analyzing and extracting keywords or other portions of content from a webpage automatically. The content of the webpage or other resource is obtained and analyzed using keyword extraction filters to derive one or more keywords that uniquely represent the content of the resource. An alternate URL is constructed based on the keywords. The keywords can be extracted from any portion of the content or from dictionary definitions or similar meanings of the content. The alternate URL is constructed such that it is unique among existing URLs. The alternate URL meaningfully represents the content, permitting the user to use or share the alternate URL on social media and elsewhere.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 17, 2015
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventors: Smitha V., Mohit Garg, Ankur Jain, Frank Jennings