Patents by Inventor Arnab Roy

Arnab Roy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210064687
    Abstract: A method of solving a large scale combinatorial optimization problem including inputting, via at least one processor, an objective function and an initial solution as a mapping from a plurality of n nodes, randomly clustering the plurality of nodes into k clusters of n/k nodes each, for each cluster of the k clusters, assigning binary variables to denote each possible permutation of a label set within the cluster, determining that there are u=k2 variables if k>2, and u=1 variables if k=2, expressing the objective function in terms of the un/k variables, solving the objective function in terms of the un/k variables using a Quadratic Unconstrained Binary Optimization (QUBO) solver to obtain an updated solution, determining whether a convergence criteria is satisfied for the updated solution, and upon a determination that a convergence criteria is satisfied, outputting the updated solution to the objective function.
    Type: Application
    Filed: May 29, 2020
    Publication date: March 4, 2021
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Sarvagya UPADHYAY, Hayato USHIJIMA-MWESIGWA, Xiaoyuan LIU
  • Publication number: 20210021408
    Abstract: A method may include receiving, from a first trusted authority, a secret key specific to a party for use in posting to a blockchain. The method may also include receiving, from a second trusted authority, a correlated randomness component specific to the party and associated with a given temporal segment. The method may additionally include generating a party-generated randomized mask, and computing, using an input from the party, the correlated randomness component, and the party-generated randomized mask in a non-interactive multi-party computation (NIMPC), an NIMPC-encrypted input associated with the party for the given temporal segment. The method may also include encrypting the NIMPC-encrypted input according to a blockchain encryption algorithm to yield a ciphertext, and submitting the ciphertext to a block associated with the given temporal segment in a blockchain.
    Type: Application
    Filed: July 19, 2019
    Publication date: January 21, 2021
    Applicant: FUJITSU LIMITED
    Inventors: Arnab ROY, Hart MONTGOMERY
  • Patent number: 10896345
    Abstract: A method may include extracting feature-data from an image which includes location data that indicates multiple locations within the image and multiple feature vectors that each correspond to one of the multiple locations. Each feature vector may represent a feature of an object in the image. The method may include determining a feature-data plot based on relative positions of the multiple locations and selecting a grid for the feature-data plot. The method may include generating a first representative feature vector for a first cell of the grid based on a first feature vector set and generating a second representative feature vector for a second cell of the grid based on a second feature vector set. The method may include generating a single feature vector that represents the object in the image based on the first representative feature vector and the second representative feature vector and encrypting the single feature vector.
    Type: Grant
    Filed: June 2, 2017
    Date of Patent: January 19, 2021
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, Nilanjan Datta
  • Publication number: 20200409918
    Abstract: A method of converting a HOBO problem into a QUBO problem. The method may include creating a data structure of key-value pairs by sorting the plurality of indices of the variables of the HOBO problem, the key in each key-value pair corresponding to combinations of quadratic terms appearing in the HOBO and the value corresponding to all terms of at least degree three that contain the associated key. For each key of the data structure, a quadratization process is performed including identifying a key with the largest number of associated values, replacing the identified key with an auxiliary variable, and updating the data structure so as to correspond with the replacement of the auxiliary variable, storing the auxiliary variable and a quadratic term the auxiliary variable replaced as a pair in a data map. The method may also include constructing a quadratic polynomial for each pair in the data map.
    Type: Application
    Filed: June 25, 2019
    Publication date: December 31, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Sarvagya UPADHYAY, Hayato USHIJIMA-MWESIGWA
  • Patent number: 10868657
    Abstract: Systems, procedures, and instrumentalities are disclosed providing mixed data services such as mixed URLLC and eMBB services. In one example implementation, hierarchical modulation is dynamically configured and/or applied to provide the mixed services. The dynamic configuration and application of hierarchical modulation may be based on the respective priorities of the services and a condition of the concerned wireless network. The provision of the mixed services may utilize polar coding techniques. Control information may be mixed with data associated with the services.
    Type: Grant
    Filed: July 5, 2017
    Date of Patent: December 15, 2020
    Assignee: IDAC Holdings, Inc.
    Inventors: Kyle Jung-Lin Pan, Arnab Roy, Mohamed Abou El Seoud, Fengjun Xi, Kevin T. Wanuga, William E. Lawton, Janet A. Stern-Berkowitz
  • Patent number: 10797856
    Abstract: A method of outsourcing an operation with encryption is provided. A method may include encrypting data at trusted execution environment (TEE) to generate a first ciphertext. The method may also include conveying the first ciphertext to a graphics processing unit (GPU). Further, the method may include performing, at the GPU, at least one somewhat homomorphic encryption (SHE) evaluation operation on the first ciphertext to generate a second ciphertext. Moreover, the method may include conveying the second ciphertext to the TEE. In addition, the method may include decrypting, at the TEE, the second ciphertext to generate a function.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: October 6, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Patent number: 10795658
    Abstract: A method may include generating, via a setup function, public parameters associated with a random updatable function. The method may further include generating, via an initialization function and based at least in part on the public parameters generated by the setup function, a first random element and a first state. The method may further include generating, via an update function and based at least in part on the public parameters generated by the setup function, a third random element and a second state. Inputs of the update function may include the first state generated by the initialization function and a second random element.
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: October 6, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Publication number: 20200314906
    Abstract: A method to reserve a directional channel, such as in an unlicensed spectrum for instance, is disclosed. In an example embodiment, the method may be performed by a receiving node, such as a user equipment (UE) for instance. In such method, the receiving node may receive an enhanced directional transmit request message from a transmitting node and transmit an enhanced directional transmit confirmation message using one or more first beams, with at least one first beam being directed in a first direction towards the transmitting node. Further, the receiving node may transmit at least one additional enhanced directional transmit confirmation message using one or more second beams, with at least one second beam being directed in a second direction towards a potentially interfering node. In the method, the second direction is a different direction than the first direction.
    Type: Application
    Filed: October 17, 2018
    Publication date: October 1, 2020
    Inventors: Sanjay Goyal, Arnab Roy, Alpaslan Demir, J. Patrick Tooher, Janet Stern-Berkowitz, Moon-il Lee, Lorenza Giupponi, Sandra Lagén Morancho, Biljana Bojovic, Mihaela Beluri
  • Publication number: 20200304179
    Abstract: A method and apparatus are disclosed for communication in a Millimeter Wave Hotspot (mmH) backhaul system which uses mesh nodes. A mmH mesh node may receive a control signal which includes a total number of available control slots. The mesh node may determine the number of iterations of a resource scheduling mechanism that can be made during the time period of all available control slots, based on the number of neighbor nodes for the mesh node. Further, the mesh node may receive control slot information, including information about traffic queues and priorities. The mesh node may then perform resource scheduling using the resource scheduling mechanism based on the currently received control slot information and control slot information received in previous iterations of resource scheduling. The mesh node may also adjust a preamble based on a time between a last packet transmission and a current packet transmission to a neighboring node.
    Type: Application
    Filed: June 5, 2020
    Publication date: September 24, 2020
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Steven FERRANTE, Arnab ROY, Philip J. PIETRASKI, Ravikumar V. PRAGADA
  • Patent number: 10779196
    Abstract: A station (STA) may include an antenna and a processor operatively coupled to the antenna. The antenna and the processor may be configured to receive a request message from an access point (AP). The request message may include identity information of one or more other STAs and an indication to perform measurements of the one or more other STAs. The antenna and the processor may be further configured to perform the measurements of the one or more STAs to determine a link metric associated with each STA of the one or more other STAs. The antenna and the processor may be further configured to send a reply message to the AP after the link metric associated with each STA of the one or more STAs is determined. The reply message may include results of the determination.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: September 15, 2020
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Arnab Roy, Yugeswar Deenoo, Ravikumar V. Pragada
  • Patent number: 10728022
    Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: July 28, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Publication number: 20200236795
    Abstract: Techniques and mechanisms for providing anisotropic etching of a metallization layer of a substrate. In an embodiment, the metallization layer includes grains of a conductor, wherein a first average grain size and a second average grain size correspond, respectively, to a first sub-layer and a second sub-layer of the metallization layer. The first sub-layer and the second sub-layer each span at least 5% of a thickness of the metallization layer. A difference between the first average grain size and the second average grain size is at least 10% of the first average grain size. In another embodiment, a first condition of metallization processing contributes to grains of the first sub-layer being relatively large, wherein an alternative condition of metallization processing contributes to grains of the second sub-layer being relatively small. A grain size gradient across a thickness of the metallization layer facilitates etching processes being anisotropic.
    Type: Application
    Filed: September 27, 2017
    Publication date: July 23, 2020
    Applicant: INTEL CORPORATION
    Inventors: Jeremy Ecton, Nicholas Haehn, Oscar Ojeda, Arnab Roy, Timothy White, Suddhasattwa Nad, Hsin-Wei Wang
  • Publication number: 20200233643
    Abstract: A method may include obtaining a set of multivariate quadratic polynomials associated with a multivariate quadratic problem and generating an Ising Model connection weight matrix “W and an Ising Model bias vector “b” based on the multivariate quadratic polynomials. The method may also include providing the matrix “W” and the vector “b” to an annealing system configured to solve problems written according to the Ising Model and obtaining an output from the annealing system that represents a set of integers. The method may also include using the set of integers as a solution to the multivariate quadratic problem.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 23, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Hart MONTGOMERY, Arnab ROY, Ryuichi OHORI, Toshiya SHIMIZU, Takeshi SHIMOYAMA, Jumpei YAMAGUCHI
  • Patent number: 10700862
    Abstract: A method may include obtaining public keys for each user of a set of users, where each user is associated with a unique public key and a unique private key. The method may also include obtaining a designated set of users, where the designated set of users is a subset of the set of users. The method may additionally include generating, using the public keys, a digest associated with the designated set of users. The digest includes reduced data sets in a secure form, where each user of the set of users is associated with one of the reduced data sets that is indicative of whether the user is in the designated set of users, and the reduced data set is accessible using the private key of the user. The method may also include posting the digest to a location accessible from an electronic device of the user.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: June 30, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Publication number: 20200201991
    Abstract: According to an aspect of an embodiment, a method of determining information leakage of a computer-readable program may include obtaining a first component of the computer-readable program. The first component may have a first information leakage that may be unknown. The first component may be comprised of a second component and a third component. The method may also include obtaining a second information leakage of the second component. The method may also include obtaining a third information leakage of the third component. The method may also include determining a relationship between the second component and the third component relative to the first component. The method may also include determining the first information leakage based on the second information leakage, the third information leakage, and the relationship.
    Type: Application
    Filed: December 21, 2018
    Publication date: June 25, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
  • Patent number: 10691829
    Abstract: An anonymization system may include a merger to merge a public database and a private database to create a merged database. The merged database may include multiple blank entries and multiple initial values associated with multiple user identifiers. The anonymization system may include a value generator to fill values for the blank entries via a machine learning algorithm and based on the initial values to create a filled database including the initial values and the fill values. The anonymization system may include a perturber to perturb one or more of the initial values or the fill values of the filled database to create a perturbed database. The anonymization system may include a releaser to release at least a portion of the perturbed database.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: June 23, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Publication number: 20200184366
    Abstract: According to an aspect of an embodiment, a method may include obtaining a task graph that represents operations for a task. The task graph may include multiple sub-task graphs. The method may further include obtaining a first computation time to perform a subset of the operations corresponding to a set of the multiple sub-task graphs based on parallel performance of the subset of the operations. The method may further include obtaining a second computation time to perform the subset of the operations using multiple resources according to a resource schedule of the multiple resources and determining a difference between the first computation time and the second computation time. The method may further include in response to the difference satisfying a threshold, performing the operations of the task graph using the multiple resources based on the resource schedule of the multiple resources.
    Type: Application
    Filed: December 6, 2018
    Publication date: June 11, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Gagan KHANIJAU
  • Publication number: 20200136924
    Abstract: A method for generating a network device snapshot includes capturing an image of a network device. The method also includes determining an identifier of the network device based on the captured image. Additionally, the method includes requesting logical information about the network device from a network management server for a network of the device, based on the identifier. Further, the method includes determining a plurality of portion identifiers for a corresponding plurality of viewable portions of the network device based on the captured image. Also, the method includes associating a portion of the logical information with each of the viewable portions based on the portion identifiers. The method additionally includes generating a network device snapshot by augmenting each of a plurality of portions of the captured image comprising a corresponding one of the viewable portions with the associated portion of the logical information.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Tathagata Roy, Praveen Krishnakumar Parangattil, Mubeesh Ali Var VM, Arnab Chaudhuri
  • Publication number: 20200133996
    Abstract: According to an aspect of an embodiment, a method may include obtaining a plurality of random integers, a divisor, and a remainder associated with a random modular subset sum problem and generating an Ising Model connection weight matrix “W”, at least some elements of the matrix “W” may be determined based on the plurality of random integers. The method may also include generating an Ising Model bias vector “b”, elements of the vector “b” be may be determined based on the remainder. The method may also include providing the matrix “W” and the vector “b” to an annealing system configured to solve problems written according to the Ising Model and obtaining an output from the annealing system that represents a set of integers of the plurality of random integers. The method may also include using the set of integers as a solution to the random modular subset sum problem.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Applicant: Fujitsu Limited
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Publication number: 20200133995
    Abstract: According to an aspect of an embodiment, operations may include obtaining a basis “A” that defines a lattice in an m-dimensional space. The operations may further include obtaining a target vector “y” that defines a particular location in the m-dimensional space. In addition, the operations may include generating an Ising model connection weight matrix “W” by multiplying a transposition of “A” (“AT”) by “A”. Moreover, the operations may include generating an Ising model bias vector “b” by multiplying a transposition of “y” (“yT”) by “A”. The operations may further include providing “W” and “b” to an annealing system configured to solve problems written according to the Ising model. Additionally, the operations may include obtaining an output from the annealing system that represents an output vector “x” of a particular point included in the lattice that is the closest point in the lattice to the particular location defined by “y”.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY