Patents by Inventor Anshuman Sinha
Anshuman Sinha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250117228Abstract: This application is directed to systems and methods for executing a user application on a multi-tenant service platform. In some embodiments, a disclosed method includes obtaining, from a user, a request associated with a first division in a user application; identifying an operation policy associated with a configuration of the user application for the first division, the user application including a plurality of executors configured to provide a plurality of parameters associated with the configuration; based at least in part on the operation policy of the first division, selecting one of the plurality of executors to respond to the request associated with the first division; executing the user application using the selected one of the plurality of executors to generate a response to the request associated with the first division; and transmitting the response to the request associated with the first division to the user.Type: ApplicationFiled: September 12, 2024Publication date: April 10, 2025Inventors: Anshuman Sinha, Arun George, Somya Iyer
-
Patent number: 11651156Abstract: There is a need for more effective and efficient document summarization. This need can be addressed by, for example, techniques for contextual summarization using semantic intelligence. In one example, a method includes identifying a plurality of senses associated with a plurality of words in a document; for each word-sense pair, determining a word-sense probability score; determining, based at least in part on each word-sense probability score for a word-sense pair, one or more context buckets for the document and one or more sense buckets for the document; determining, based at least in part on the one or more context buckets for the document and the one or more sense buckets for the document, the contextual summarization of the document; and performing one or more document processing actions based at least in part on the contextual summarization.Type: GrantFiled: May 7, 2020Date of Patent: May 16, 2023Assignee: Optum Technology, Inc.Inventors: Sanjay K. Singh, Anshuman Sinha, Devikiran Ramadas, Piyush Gupta
-
Publication number: 20210350079Abstract: There is a need for more effective and efficient document summarization. This need can be addressed by, for example, techniques for contextual summarization using semantic intelligence. In one example, a method includes identifying a plurality of senses associated with a plurality of words in a document; for each word-sense pair, determining a word-sense probability score; determining, based at least in part on each word-sense probability score for a word-sense pair, one or more context buckets for the document and one or more sense buckets for the document; determining, based at least in part on the one or more context buckets for the document and the one or more sense buckets for the document, the contextual summarization of the document; and performing one or more document processing actions based at least in part on the contextual summarization.Type: ApplicationFiled: May 7, 2020Publication date: November 11, 2021Inventors: Sanjay K. Singh, Anshuman Sinha, Devikiran Ramadas, Piyush Gupta
-
Patent number: 11113327Abstract: There is a need for solutions that perform preprocessing and/or searching of documents with semantic intelligence. This need can be addressed by, for example, by performing pre-processing of each document of a plurality of documents to generate an indexed representation for the document by identifying sentences in the document; determining, for each n-gram of one or more n-grams associated with the document, one or more n-gram semantic scores based semantic proximity indicators for the n-gram; determining, based at least in part on each one or more n-gram semantic scores, one or more sentence semantic labels for each sentence in the document; and determining the indexed representation for the document based at least in part on the one or more sentence semantic labels for the document; performing the search query based each indexed representation associated with a document; and transmitting the result to a computing device associated with the search query.Type: GrantFiled: February 13, 2019Date of Patent: September 7, 2021Assignee: OPTUM TECHNOLOGY, INC.Inventors: Sanjay Kumar Singh, Anshuman Sinha, Piyush Gupta
-
Patent number: 10885081Abstract: Systems, apparatuses, methods, and computer program products are disclosed for searching electronic documents. An example method includes receiving a set of electronic documents, wherein each electronic document in the set of electronic documents comprises a set of sentences. The example method further includes generating a contextual index that associates each sentence with one or more of contexts. The example method further includes receiving an electronic search query comprising a plurality of search terms. Subsequently, the example method includes generating a contextual search ranking for a subset of the set of electronic documents based on the search terms and the contextual index.Type: GrantFiled: July 2, 2018Date of Patent: January 5, 2021Assignee: Optum Technology, Inc.Inventors: Anshuman Sinha, Sanjay Kumar Singh, Nilabh Sagar
-
Publication number: 20200257712Abstract: There is a need for solutions that perform preprocessing and/or searching of documents with semantic intelligence. This need can be addressed by, for example, by performing pre-processing of each document of a plurality of documents to generate an indexed representation for the document by identifying sentences in the document; determining, for each n-gram of one or more n-grams associated with the document, one or more n-gram semantic scores based semantic proximity indicators for the n-gram; determining, based at least in part on each one or more n-gram semantic scores, one or more sentence semantic labels for each sentence in the document; and determining the indexed representation for the document based at least in part on the one or more sentence semantic labels for the document; performing the search query based each indexed representation associated with a document; and transmitting the result to a computing device associated with the search query.Type: ApplicationFiled: February 13, 2019Publication date: August 13, 2020Inventors: Sanjay Kumar Singh, Anshuman Sinha, Piyush Gupta
-
Publication number: 20200004876Abstract: Systems, apparatuses, methods, and computer program products are disclosed for searching electronic documents. An example method includes receiving a set of electronic documents, wherein each electronic document in the set of electronic documents comprises a set of sentences. The example method further includes generating a contextual index that associates each sentence with one or more of contexts. The example method further includes receiving an electronic search query comprising a plurality of search terms. Subsequently, the example method includes generating a contextual search ranking for a subset of the set of electronic documents based on the search terms and the contextual index.Type: ApplicationFiled: July 2, 2018Publication date: January 2, 2020Inventors: Anshuman Sinha, Sanjay Kumar Singh, Nilabh Sagar
-
Publication number: 20160371904Abstract: An exemplary security system includes a credential holder having a credential database that contains specified secured area credential information indicating at least one secured access location between a specified secured area and a specified adjacent area where the credential information is valid for authorized access. An access control device at a selected position corresponding to the secured access location is configured to receive the credential information when the credential holder is near the access control device. A processor of the access control device has stored access control information including indications of the specified secured area, the specified adjacent area and the secured access location. The processor autonomously determines that access to the specified secured area will be granted when the received credential information corresponds to the stored indications.Type: ApplicationFiled: May 20, 2016Publication date: December 22, 2016Inventor: Anshuman SINHA
-
Patent number: 8238194Abstract: Methods for compression of sonic log data include STC processing, sorting peak components in the sonic data; filtering the sorted peak components to remove high-frequency portions in the peak components; and decimating the filtered peak components according to a selected ratio to produce compressed data. One method for telemetry transmission of downhole sonic log data includes sorting peak components in the sonic log data; compressing the sorted peak components to produce compressed data; packing the compressed data to produce data packets for telemetry transmission; and sending the data packets using telemetry.Type: GrantFiled: December 4, 2006Date of Patent: August 7, 2012Assignee: Schlumberger Technology CorporationInventors: Peter T. Wu, Pierre Campanac, Shu-Kong Chang, James G. L. Thompson, Anshuman Sinha
-
Publication number: 20120025947Abstract: An exemplary security system includes a credential holder having a credential database that contains specified secured area credential information indicating at least one secured access location between a specified secured area and a specified adjacent area where the credential information is valid for authorized access. An access control device at a selected position corresponding to the secured access location is configured to receive the credential information when the credential holder is near the access control device. A processor of the access control device has stored access control information including indications of the specified secured area, the specified adjacent area and the secured access location. The processor autonomously determines that access to the specified secured area will be granted when the received credential information corresponds to the stored indications.Type: ApplicationFiled: August 2, 2010Publication date: February 2, 2012Inventor: Anshuman Sinha
-
Patent number: 8052060Abstract: An improved physical access control system has an online portion and an offline portion. A smartcard is configurable to transport access control information between the online portion and offline portion. The smartcard is further configurable to receive an offline reader identifier from an offline reader, and to control access of the smartcard holder to an offline entry/exit point. The smartcard is further configurable to carry a revoked list that is transmitted to each offline reader accessed. Methods of operating the improved physical access control system are also disclosed.Type: GrantFiled: September 25, 2008Date of Patent: November 8, 2011Assignee: UTC Fire & Security Americas Corporation, Inc.Inventors: Khalil W. Yacoub, Anshuman Sinha
-
SMARTCARD, HOLDER AND METHOD FOR LOADING AND UPDATING ACCESS CONTROL DEVICE FIRMWARE AND/OR PROGRAMS
Publication number: 20100329458Abstract: A smartcard having a secure memory storing new firmware, new programs, and/or updated firmware and/or programs. A holder configured to receive the smartcard and to position the smartcard within communication range of an access control device. Methods for loading and/or updating access control device firmware, programs and/or software.Type: ApplicationFiled: June 30, 2009Publication date: December 30, 2010Inventor: Anshuman SINHA -
Publication number: 20100077474Abstract: An improved physical access control system has an online portion and an offline portion. A smartcard is configurable to transport access control information between the online portion and offline portion. The smartcard is further configurable to receive an offline reader identifier from an offline reader, and to control access of the smartcard holder to an offline entry/exit point. The smartcard is further configurable to carry a revoked list that is transmitted to each offline reader accessed. Methods of operating the improved physical access control system are also disclosed.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Inventors: Khalil W. Yacoub, Anshuman Sinha
-
Patent number: 7392404Abstract: A smart card which includes a non-volatile read/write memory and a processor connected to the memory, and further configured to cause the processor to perform a method for enhancing data security and managing the contents of memory during periods when the computational power of the processor is underutilized. The method includes steps for determining if a command or character has been received, processing and/or responding to the command or character once received, implementing a security measure and/or managing memory, and performing a tamper protocol in response to detecting a security breach, all of which is performed while waiting to receive the next command or character.Type: GrantFiled: December 20, 2002Date of Patent: June 24, 2008Inventors: Michael A. Montgomery, Anshuman Sinha, Danny Kumamoto
-
Patent number: 7317990Abstract: A method for distributed processing in a subsurface environment includes running a local program on a local computation unit, wherein the local program is configured to call a remote procedure to be executed by a remote computation unit, wherein the local computation unit and the remote computation unit are disposed in a subsurface environment; initiating a remote procedure call; executing the remote procedure on the remote computation unit, while the local computation unit performs another operation; and returning a result from the executing the remote procedure to the local computation unit.Type: GrantFiled: October 10, 2005Date of Patent: January 8, 2008Assignee: Schlumberger Technology CorporationInventors: Anshuman Sinha, Alain Dumont
-
Publication number: 20060089816Abstract: A method for distributed processing in a subsurface environment includes running a local program on a local computation unit, wherein the local program is configured to call a remote procedure to be executed by a remote computation unit, wherein the local computation unit and the remote computation unit are disposed in a subsurface environment; initiating a remote procedure call; executing the remote procedure on the remote computation unit, while the local computation unit performs another operation; and returning a result from the executing the remote procedure to the local computation unit.Type: ApplicationFiled: October 10, 2005Publication date: April 27, 2006Applicant: SCHLUMBERGER TECHNOLOGY CORPORATIONInventors: ANSHUMAN SINHA, ALAIN DUMONT
-
Publication number: 20060062081Abstract: A method for compression of sonic log data includes sorting peak components in the sonic data; filtering the sorted peak components to remove high-frequency portions in the peak components; and decimating the filtered peak components according to a selected ratio to produce compressed data. A method for telemetry transmission of downhole sonic log data includes sorting peak components in the sonic log data; compressing the sorted peak components to produce compressed data; packing the compressed data to produce data packets for telemetry transmission; and sending the data packets where desired using telemetry.Type: ApplicationFiled: September 23, 2004Publication date: March 23, 2006Applicant: SCHLUMBERGER TECHNOLOGY CORPORATIONInventors: Peter Wu, Pierre Campanac, Anshuman Sinha, James G. Thompson
-
Publication number: 20040123132Abstract: A smart card which includes a non-volatile read/write memory and a processor connected to the memory, and further configured to cause the processor to perform a method for enhancing data security and managing the contents of memory during periods when the computational power of the processor is underutilized. The method includes steps for determining if a command or character has been received, processing and/or responding to the command or character once received, implementing a security measure and/or managing memory, and performing a tamper protocol in response to detecting a security breach, all of which is performed while waiting to receive the next command or character.Type: ApplicationFiled: December 20, 2002Publication date: June 24, 2004Inventors: Michael A. Montgomery, Anshuman Sinha, Danny Kumamoto