Patents by Inventor Ankur Jain
Ankur Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160272485Abstract: A device may comprise a substrate formed of a first semiconductor material and a trench formed in the substrate. A second semiconductor material may be formed in the trench. The second semiconductor material may have first and second portions that are isolated with respect to one another and that are isolated with respect to the first semiconductor material.Type: ApplicationFiled: May 26, 2016Publication date: September 22, 2016Inventors: Ankur JAIN, Roman C. GUTIERREZ, Shi-Sheng LEE, Robert J. CALVET, Xiaolei LIU
-
Patent number: 9449526Abstract: In some implementations, one or more words from a digital work are used to generate a game to be displayed on an electronic device. For example, the electronic device may include a library of one or more digital works. A word or knowledge game may be dynamically generated based on objects, such as characters, topics, places, organizations, things, etc., identified in at least one digital work in the library. As one example, a crossword puzzle may be created to include words and clues based at least in part on the objects identified in at least one digital work and supplemental information associated with the objects. The clues for the crossword puzzle may be generated automatically based, at least in part, on a desired level of difficulty. Further, in some cases, the game may be generated from words drawn from multiple digital works in the library.Type: GrantFiled: March 19, 2012Date of Patent: September 20, 2016Assignee: Amazon Technologies, Inc.Inventors: Walter Manching Tseng, Adam J. Iser, Michel L. Goldstein, Ravi Shankar Thangavel, Janna S. Hamaker, Ankur Jain
-
Patent number: 9430014Abstract: Various embodiments of methods and systems for idle state optimization in a portable computing device (“PCD”) are disclosed. An exemplary method includes comparing an aggregate power consumption level for all processing cores in the PCD to a power budget and, if there is available headroom in the power budget, transitioning cores operating in a first idle state to a different idle state. In doing so, the latency value associated with bringing the transitioned cores out of an idle state and into an active state, should the need arise, may be reduced. The result is that user experience and QoS may be improved as an otherwise idle core in an idle state with a long latency time may be better positioned to quickly transition to an active state and process a workload.Type: GrantFiled: July 18, 2013Date of Patent: August 30, 2016Assignee: QUALCOMM INCORPORATEDInventors: Ankur Jain, Unnikrishnan Vadakkanmaruveedu, Vinay Mitter, Henri Begin, Praveen Chidambaram
-
Publication number: 20160234015Abstract: A secure secrets proxy is instantiated in a first computing environment and includes secure secrets proxy authentication data for identifying itself to a secrets distribution management system in a second computing environment as a trusted virtual asset to receive and cache secrets data in a secure secrets cache outside the second computing environment. A virtual asset requests one or more secrets, triggering a process to authenticate the requesting virtual asset, gathering authorized secrets data representing secrets the virtual asset is allowed to have. The secure secrets proxy is provided data representing the requested secrets and stores that secrets data in the secure secrets cache of the proxy.Type: ApplicationFiled: April 20, 2016Publication date: August 11, 2016Applicant: Intuit Inc.Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
-
Patent number: 9390288Abstract: Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data.Type: GrantFiled: November 1, 2013Date of Patent: July 12, 2016Assignee: Intuit Inc.Inventors: Oleg Gryb, Jinglei Whitehouse, Elangovan Shanmugam, Ankur Jain, III, Mark Basler, M. Shannon Lietz, Sabu Kuruvila Philip, Luis Felipe Cabrera, Thomas Bishop
-
Patent number: 9384362Abstract: Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data.Type: GrantFiled: October 14, 2013Date of Patent: July 5, 2016Assignee: Intuit Inc.Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
-
Publication number: 20160192121Abstract: The present disclosure provides a method for exchanging contact information, comprising detecting a first exchange event on a first mobile electronic device of a first user and initiating the exchange of contact information between the first mobile electronic device and a second mobile electronic device of another user that has detected a second exchange event. Next, contact information of the first user is transmitted from the first mobile electronic device to the second mobile electronic device and contact information of the second user is received at the first mobile electronic device.Type: ApplicationFiled: October 14, 2015Publication date: June 30, 2016Inventors: Ankur JAIN, Ian MURRAY, Daniel O'SHEA, Kevin LINDKVIST, Joe DAO, Clara ZAVANI, Ryan MICK, John ULLMAN, Arielle ZUCKERBERG, Mijail GOMEZ, James MCERLAIN, Sinan ARAL, Purshotam RAJANI, David WYLER
-
Patent number: 9360907Abstract: Various embodiments of methods and systems for adaptive thermal management techniques implemented in a portable computing device (“PCD”) are disclosed. Notably, in many PCDs, temperature thresholds associated with various components in the PCD such as, but not limited to, die junction temperatures, package on package (“PoP”) memory temperatures and the “touch temperature” of the external surfaces of the device itself limits the extent to which the performance capabilities of the PCD can be exploited. It is an advantage of the various embodiments of methods and systems for adaptive thermal management that, when a temperature threshold is violated, the performance of the PCD is sacrificed only as much and for as long as necessary to clear the violation before authorizing the thermally aggressive processing component(s) to return to a maximum operating power.Type: GrantFiled: January 20, 2015Date of Patent: June 7, 2016Assignee: QUALCOMM IncorporatedInventors: Paras S. Doshi, Ankur Jain, Unnikrishnan Vadakkanmaruveedu, Vinay Mitter, Anil Vootukuru, Ronald F. Alton, Jon J. Anderson
-
Patent number: 9352962Abstract: A device may comprise a substrate formed of a first semiconductor material and a trench formed in the substrate. A second semiconductor material may be formed in the trench. The second semiconductor material may have first and second portions that are isolated with respect to one another and that are isolated with respect to the first semiconductor material.Type: GrantFiled: November 15, 2010Date of Patent: May 31, 2016Assignee: DigitalOptics Corporation MEMSInventors: Ankur Jain, Roman C. Gutierrez, Shi-Sheng Lee, Robert J. Calvet, Xiaolei Liu
-
Patent number: 9341520Abstract: Various embodiments of methods and systems for estimating environmental ambient temperature of a portable computing device (“PCD”) from electrical resistance measurements taken voice coils in a speaker or microphone component are disclosed. In an exemplary embodiment, it may be recognized that the PCD is in an idle state, thus producing little or no thermal energy. Electrical resistance measurements are taken from a voice coil and used to estimate the environmental ambient temperature to which the PCD is exposed. Certain embodiments may simply render the estimated ambient temperature for the benefit of the user or use the estimated ambient temperature as an input to a program or application running on the PCD. It is envisioned that certain embodiments of the systems and methods may use the estimated ambient temperature to adjust temperature thresholds in the PCD against which thermal management policies govern thermally aggressive processing components.Type: GrantFiled: June 16, 2013Date of Patent: May 17, 2016Assignee: QUALCOMM INCORPORATEDInventors: Unnikrishnan Vadakkanmaruveedu, Zenghui Zhao, Vinay Mitter, Roy Silverstein, Ankur Jain, Jon Anderson
-
Publication number: 20160125451Abstract: Techniques are disclosed for improving electronic communications or so-called posts prior to publication by automatically providing asset suggestions. The techniques generally leverage known historical performance data of rich media “assets” such as image content, graphics content, video content, and audio content. In operation, an asset repository is searched to identify a set of candidate assets that match keywords extracted from a proposed post. The identified candidate assets are ranked based on their performance in one or more target user segments associated with the target audience of post. The post can then be modified to include one or more of the ranked assets. In one example case, the ranked assets are provided to the user, so that the user can select one or more of the ranked assets for incorporation into the post.Type: ApplicationFiled: November 4, 2014Publication date: May 5, 2016Applicant: ADOBE SYSTEMS INCORPORATEDInventors: Mohit Garg, Ankur Jain
-
Publication number: 20160112457Abstract: One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken.Type: ApplicationFiled: December 15, 2015Publication date: April 21, 2016Applicant: Intuit Inc.Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Barry J. Nisly, Ted R. Neher, III, Javier Godinez, Ankur Jain
-
Publication number: 20160104069Abstract: Techniques are disclosed for automatically detecting anomalies in the content of a scheduled social media post, alerting a user to the presence of such anomalies before the content is posted and recommending a course of action when an anomaly is detected. A set of keywords is extracted from a scheduled post using an ontological classification technique. At predetermined time intervals, the keywords are compared with information obtained from one or more data sources to determine if an anomaly is present. If an anomaly is detected, the scheduled post is classified into one of at least three categories: supporting the post, neutral, or opposing the post. Once the anomaly is detected and the scheduled post is classified, the author of the post is alerted to the anomaly along with the categorization. Subsequently, the author may reschedule the post to an earlier or later time, delete the post, or change the post.Type: ApplicationFiled: October 14, 2014Publication date: April 14, 2016Applicant: Adobe Systems IncorporatedInventors: Mohit Garg, Pawan Goyal, Ankur Jain, Vivek Kumar
-
Patent number: 9310139Abstract: An apparatus for managing heat generated by at least one electronic component of a mobile device, the apparatus comprising: a housing for containing the electronic component of the mobile device; and a vapor chamber arranged in the housing, the vapor chamber having a cavity defined by a front wall and a rear wall opposite the rear wall, the front wall for receiving heat generated by the electronic component of the mobile device to evaporate fluid in the cavity into a vapor, the rear wall for receiving the vapor to allow the vapor to condense to liquid thereby cooling the rear wall of the vapor chamber; wherein an outer surface of the housing comprises at least a portion of the rear wall of the vapor chamber.Type: GrantFiled: March 15, 2013Date of Patent: April 12, 2016Assignee: QUALCOMM IncorporatedInventors: Unnikrishnan Vadakkanmaruveedu, Mulugeta K. Berhe, Vinay Mitter, Ankur Jain, Paras S. Doshi
-
Patent number: 9246935Abstract: One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken.Type: GrantFiled: October 14, 2013Date of Patent: January 26, 2016Assignee: Intuit Inc.Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Barry J. Nisly, Ted R. Neher, III, Javier Godinez, Ankur Jain
-
Patent number: 9208224Abstract: A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy.Type: GrantFiled: May 18, 2015Date of Patent: December 8, 2015Assignee: International Business Machines CorporationInventors: Sumana S. Bhat, Karen L. B. Brown, Ankur Jain, Bipin K. Joshi, Biplav Srivastava, Srikanth G. Tamilselvam, Terrence E. White
-
Patent number: 9154367Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving a plurality of requests from a plurality of client devices sent to a public internet protocol address; routing the requests to one or more internal Internet protocol addresses, where the one or more internal Internet protocol addresses correspond to one or more compute nodes, and where the one or more compute nodes process the routed requests; determining a particular compute node is offline, where the particular compute node is assigned one or more internal Internet protocol addresses; in response to the determination that the particular node is offline, reassigning the one or more internal Internet protocol addresses corresponding to the particular compute node to one or more different compute nodes, where requests communicated to the reassigned internal Internet protocol addresses are communicated to the one or more different compute nodes for processing.Type: GrantFiled: December 27, 2011Date of Patent: October 6, 2015Assignee: Google Inc.Inventors: Leonidas Kontothanassis, Paul Schultz, David Presotto, Ankur Jain
-
Publication number: 20150281066Abstract: An autonomous network and a corresponding routing method include determining routing paths by a controller, and providing the determined routing paths to a data packet processor located remotely from the controller. The data packet processor routes outgoing data packets, based on information from the controller, through a plurality of switches remotely from the data packet processor. Each switch includes a plurality of network interfaces. For an outgoing data packet, the data packet processor determines a network interface over which to transmit the data packet, and adds an indication of the determined network interface in a header of the data packet. The data packet processor forwards the modified data packet to the switch including the determined network interface. The switch identifies the network interface based on the indication, and transmits the outgoing data packet over the identified network interface.Type: ApplicationFiled: September 5, 2014Publication date: October 1, 2015Inventors: Bikash Koley, Steven Padgett, Ankur Jain, Arjun Singh, Amin Vahdat, Mahesh Kallahalla, Mukarram Tariq
-
Publication number: 20150281317Abstract: Systems and methods are disclosed for requesting media content segments via multiple network connections. In one implementation, a processing device requests, via a first network connection, a sequential transfer of a first media content segment in a first direction. The processing device requests, via a second network connection, a sequential transfer of the first media content segment in a second direction. The processing device requests, based on a determination that the first media content segment has been received, from at least one of the first network connection or the second network connection, a second media content segment.Type: ApplicationFiled: March 11, 2015Publication date: October 1, 2015Inventors: Hao Du, Andreas Terzis, Ankur Jain
-
Publication number: 20150264105Abstract: Techniques are disclosed for automatically constructing a human-friendly and meaningful URL based on the content, context, or both, of the resource. An alternate URL can be constructed by analyzing and extracting keywords or other portions of content from a webpage automatically. The content of the webpage or other resource is obtained and analyzed using keyword extraction filters to derive one or more keywords that uniquely represent the content of the resource. An alternate URL is constructed based on the keywords. The keywords can be extracted from any portion of the content or from dictionary definitions or similar meanings of the content. The alternate URL is constructed such that it is unique among existing URLs. The alternate URL meaningfully represents the content, permitting the user to use or share the alternate URL on social media and elsewhere.Type: ApplicationFiled: March 12, 2014Publication date: September 17, 2015Applicant: ADOBE SYSTEMS INCORPORATEDInventors: Smitha V., Mohit Garg, Ankur Jain, Frank Jennings