Patents by Inventor Ashish Jain
Ashish Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12042923Abstract: An anti-pinch device for use with an insulating apparatus and an insulating apparatus that includes the anti-pinch device are provided. The anti-pinch device includes a body configured to be at least partially disposed about an insulating apparatus. The body is configured to translate relative the insulating apparatus. The device further includes a pinch prevention mechanism attached to the body of the anti-pinch device. The pinch prevention mechanism is configured to prevent ingress of at least a portion of a user's finger into the insulating apparatus in an instance in which the user actuates an input element defined by the insulating apparatus.Type: GrantFiled: June 10, 2022Date of Patent: July 23, 2024Assignee: HONEYWELL INTERNATIONAL INC.Inventors: Raviteja Tata, Prudhvi Yarlagadda, Rizwan Ahmad, Ashish Jain, Christy Garippo
-
Publication number: 20240223458Abstract: Embodiments herein disclose a method and network apparatus for network performance evaluation using AI-based network cloning. The method includes constructing one or more AI-based network clones of one or more network nodes. The one or more AI-based network clones mimics a data pattern and cell behavior of the one or more network nodes. Further, the method includes receiving a solution predicted by an AI server to mitigate one or more problems associated with one or more services of the one or more network nodes. Further, the method includes evaluating a performance of the one or more AI-based network clones by deploying the solution on the one or more AI-based network clones. Further, the method includes sending the solution to the one or more network nodes for deployment or retraining based on the performance of the one or more AI-based network clones.Type: ApplicationFiled: October 30, 2023Publication date: July 4, 2024Inventors: Sukhdeep SINGH, Joseph Thaliath, Sandeep Kumar Jaisawal, Seungil Yoon, Ashish Jain, Avinash Bhat, Ganesh Kumar Thangavel
-
Publication number: 20240211014Abstract: Systems, apparatuses, and methods for implementing efficient power optimization in a computing system are disclosed. A system management unit records operating frequencies required for a computing component to execute a first task. The system management unit stores the recorded operating frequencies in a data array or any other predetermined memory location of a computing system. The system management unit uses the recorded operating frequencies to determine operating frequencies for execution of one or more other tasks.Type: ApplicationFiled: December 27, 2022Publication date: June 27, 2024Inventors: Tzyy-Juin Kao, Ashish Jain, Rashad Oreifej
-
Publication number: 20240211023Abstract: An apparatus and method for efficiently managing power consumption among multiple, replicated functional blocks of an integrated circuit. An integrated circuit includes multiple, replicated functional blocks that use separate power domains. Data of a given type is stored in an interleaved manner among at least two of the multiple functional blocks. In one implementation, a prior static allocation determines that only a subset of the functional blocks store the data of the given type. In another implementation, each of the functional blocks stores the data of the given type, and when an idle state has occurred, data of the given type is moved between the multiple functional blocks until one or more functional blocks no longer store data of the given type. When a transition to the idle state has occurred, the functional blocks that do not store the data of the given type are transitioned to a sleep state.Type: ApplicationFiled: December 27, 2022Publication date: June 27, 2024Inventors: Gia Tung Phan, Ashish Jain, Shang Yang
-
Patent number: 12020051Abstract: Techniques of remote computing resource access using sharable links are disclosed herein. One example technique includes receiving, at a security portal of a private network, an access request from a client device of a user for accessing a virtual machine (“VM”) on the private network via a public network. The technique can then include retrieving a copy of a configuration file corresponding to the virtual machine according to the VM identifier in the access request and accessing the virtual machine according to operating parameters in the retrieved copy of the configuration file to generate an execution result. The technique can further include transmitting, from the security portal, the execution result to the client device of the user via the public network, thereby shielding, with the security portal, the virtual machine on the private network from actions initiated via the public network.Type: GrantFiled: January 17, 2020Date of Patent: June 25, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING LLCInventors: Ankur Hayatnagarkar, Ashish Jain, Buyu Chen, Abhishek Agarwal, Sandeep Bansal, Mohit Garg, Aakash Valangaiman Radhakrishnan
-
Publication number: 20240154787Abstract: Systems and methods for consistent document modification are provided. Embodiments include accessing a first document that comprises a first document object, where the first document object has a first document object style. The embodiments further comprise accessing a second document that comprises a second document object, where the second document object has a second document object style. The first document object style is to be modified based on the second document object style. The embodiments include hashing the first document object style to generate a first document object style hash, and hashing the second document object style to generate a second document object style hash. Based on determining the first document object style hash is different from the second document object style hash, the first document object is modified, within the first document, to comprise a modified first document object style that corresponds to the second document object style.Type: ApplicationFiled: November 9, 2022Publication date: May 9, 2024Inventors: Sanyam JAIN, Ashish JAIN
-
Patent number: 11960818Abstract: Embodiments are disclosed for removing typographic rivers from electronic documents. The method may include receiving an electronic document including a plurality of words for automatic typographic correction. A typographic river is identified in the electronic document, the typographic river including a plurality of nodes, each node including an empty glyph. A candidate adjustment that removes the first node of the plurality of nodes is identified and the candidate adjustment is applied to the electronic document.Type: GrantFiled: August 23, 2022Date of Patent: April 16, 2024Assignee: Adobe Inc.Inventors: Ashish Jain, Arushi Jain
-
Patent number: 11960823Abstract: A missing glyph replacement system is described. In an example, a Unicode identifier of a missing glyph is obtained and glyph metadata describing a glyph cluster that includes the Unicode identifier is obtained from a cache maintained in the storage device, e.g., as part of preprocessing. From this, the system obtains glyphs from the font using Unicode identifiers included in the glyph cluster. The system uses a representative glyph from these glyphs to verify the glyph cluster, and if verified obtains glyphs based on the cluster. For these obtained glyphs, an amount of similarity is determined for the missing glyph with respect to the plurality of obtained glyphs, e.g., to control output of representations of the obtained glyphs in the user interface. The representations are user selectable via the user interface to replace the missing glyph.Type: GrantFiled: November 10, 2022Date of Patent: April 16, 2024Assignee: Adobe Inc.Inventors: Ashish Jain, Arushi Jain
-
Publication number: 20240111351Abstract: A system and method for determining power-performance state transition thresholds in a computing system. A processor comprises several functional blocks and a power manager. Each of the functional blocks produces data corresponding to an activity level associated with the respective functional block. The power manager determines activity levels of the functional blocks and compares the activity level of a given functional block to a threshold to determine if a power-performance state (P-state) transition is indicated. The threshold is determined in part on a current P-state of the given functional block. When the current P-state of the given functional block is relatively high, the threshold activity level to transition to a higher P-state is higher than it would be if the current P-state were relatively low. The power manager is further configured to determine the thresholds based in part on one or more of a type of circuit being monitored and a type of workload being executed.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Ashish Jain, Shang Yang
-
Publication number: 20240111442Abstract: Systems, apparatuses, and methods for prefetching data by a display controller. From time to time, a performance-state change of a memory are performed. During such changes, a memory clock frequency is changed for a memory subsystem storing frame buffer(s) used to drive pixels to a display device. During the performance-state change, memory accesses may be temporarily blocked. To sustain a desired quality of service for the display, a display controller is configured to prefetch data in advance of the performance-state change. In order to ensure the display controller has sufficient memory bandwidth to accomplish the prefetch, bandwidth reduction circuitry in clients of the system are configured to temporarily reduce memory bandwidth of corresponding clients.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Ashish Jain, Shang Yang, Jun Lei, Gia Tung Phan, Oswin Hall, Benjamin Tsien, Narendra Kamat
-
Publication number: 20240106423Abstract: Systems, apparatuses, and methods for managing power and performance in a computing system. A system management unit detects a condition indicating a change in a power-performance state of a given computing unit is indicated. In response to detecting the indication, the system management unit is configured to initiate a change to a frequency of a clock signal generated by an adaptive oscillator by changing a voltage supplied to the adaptive oscillator. The adaptive oscillator is configured to rapidly change a frequency of the clock signal generated in response to detecting a change in a droopy supply voltage of the adaptive oscillator. The new frequency generated by the adaptive oscillator is based in part on a difference between the droopy supply voltage and a regulated supply voltage of the adaptive oscillator.Type: ApplicationFiled: September 26, 2022Publication date: March 28, 2024Inventors: Sokratis Dimitriadis, Rashad Oreifej, Ashish Jain, Joyce Cheuk Wai Wong, Tzyy-Juin Kao
-
Publication number: 20240103754Abstract: Systems, apparatuses, and methods for prefetching data by a display controller. From time to time, a performance-state change of a memory are performed. During such changes, a memory clock frequency is changed for a memory subsystem storing frame buffer(s) used to drive pixels to a display device. During the performance-state change, memory accesses may be temporarily blocked. In order to reduce visual artifacts that may occur while the memory accesses are blocked, a memory subsystem includes a control circuit configured to enable a caching mode which caches display data provided to the display controller. Subsequent requests for display data from the display controller are then serviced using the cached data instead of accessing memory.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Gia Tung Phan, Ashish Jain, Chintan S. Patel, Benjamin Tsien, Jun Lei, Shang Yang, Oswin Hall
-
Publication number: 20240106438Abstract: An integrated circuit includes a power supply monitor, a clock generator, and a divider. The power supply monitor is operable to provide a trigger signal in response to a power supply voltage dropping below a threshold voltage. The clock generator is operable to provide a first clock signal having a frequency dependent on a value of a frequency control word, and to change the frequency of the first clock signal over time using a native slope in response to a change in the frequency control word. The divider is responsive to an assertion of the trigger signal to divide a frequency of the first clock signal by a divide value to provide a second clock signal.Type: ApplicationFiled: November 30, 2023Publication date: March 28, 2024Applicants: Advanced Micro Devices, Inc., ATI Technologies ULCInventors: Kaushik Mazumdar, Ashish Jain, Joyce Cheuk Wai Wong, Mikhail Rodionov
-
Patent number: 11943195Abstract: A computing system is configured to perform zero-trust domain name resolution. The computing system includes applications coupled to a zero-trust client. The zero-trust client is configured to receive requests for IP addresses corresponding to endpoint identifiers for internet connected endpoints. The zero-trust client includes a synthetic DNS service configured to identify synthetic IP addresses for the endpoint identifiers. The zero-trust client provides the synthetic IP addresses for the endpoint identifiers to the applications. The zero-trust client sends data traffic from the applications to a zero-trust service with the synthetic IP addresses and sends corresponding endpoint identifiers to the zero-trust service in a fashion that allows the synthetic IP addresses to be correlated to the endpoint identifiers at the zero-trust service.Type: GrantFiled: January 20, 2023Date of Patent: March 26, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ashish Jain, Mordhai Gendelman, Or Moran, Omer Kattan, Yair Tor, Ronen Shmuel Goldsmith, Liraz Barak
-
Patent number: 11935207Abstract: In implementations of systems for generating spacing guides for objects in perspective views, a computing device implements a guide system to determine groups of line segments of perspective bounding boxes of objects displayed in a user interface of a digital content editing application. Interaction data is received describing a user interaction with a particular object of the objects displayed in the user interface. The guide system identifies a particular group of the groups of line segments based on a line segment of a perspective bounding box of the particular object. An indication of a guide is generated for display in the user interface based on the line segment and a first line segment included in the particular group.Type: GrantFiled: July 6, 2022Date of Patent: March 19, 2024Assignee: Adobe Inc.Inventors: Ashish Jain, Arushi Jain
-
Patent number: 11930426Abstract: Examples of detecting whether a device meets an enrollment level are disclosed. In one case, a method for providing access to an application on a client device includes receiving a request to access an application from the client device, determining an enrollment level associated with the application, and determining that multi-factor authentication is required for access to the application on the client device based on the enrollment level associated with the application. The method can also include initiating multi-factor authentication on the client device before access to the application is permitted. The method can also include determining that multi-factor authentication is successful on the client device, transmitting a management component to the client device, and installing the management component on the client device for enrollment as a managed device with a management service.Type: GrantFiled: December 24, 2020Date of Patent: March 12, 2024Assignee: AirWatch LLCInventors: Adam Stephen Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy, Pratik Jagad, Krishna Kumar Bhavesh
-
Publication number: 20240070376Abstract: Embodiments are disclosed for removing typographic rivers from electronic documents. The method may include receiving an electronic document including a plurality of words for automatic typographic correction. A typographic river is identified in the electronic document, the typographic river including a plurality of nodes, each node including an empty glyph. A candidate adjustment that removes the first node of the plurality of nodes is identified and the candidate adjustment is applied to the electronic document.Type: ApplicationFiled: August 23, 2022Publication date: February 29, 2024Applicant: Adobe Inc.Inventors: Ashish JAIN, Arushi JAIN
-
Publication number: 20240064138Abstract: Methods, systems and computer program products are provided for intelligent secure access to private resources. A security service (e.g., SASE ZTNA) may maintain the same or similar security posture for users who work remotely and/or locally by providing authentication, authorization, and/or ongoing conditional access via a security service (e.g., private or public SASE) while intelligently routing remote client traffic to private resources through the security service and routing local client traffic to private resources locally. A traffic routing determination may be made by a security client and/or security server. A traffic routing determination may be based on the location of a client computing device, such as a trusted network detection for a private/trusted network. Traffic routing determinations may be based on conditions alternative or in addition to location, such as the type of private resource or information being accessed by a client computing device.Type: ApplicationFiled: August 16, 2022Publication date: February 22, 2024Inventors: Ashish JAIN, Mordhai GENDELMAN, Jeevan Singh BISHT, Avraham CARMON, Sinead C. O'DONOVAN, Yair TOR
-
Publication number: 20240064147Abstract: Methods, systems and computer program products are provided for granular secure user access to private resources. Increased granularity of security policies for user access may reduce security threats to resources. Security policies indicating user access to secure resources may be based on various combinations of user identities, client-side process (e.g., sub-process) identities, device identities, device types, device locations, resource access types, intelligent access (e.g., selective traffic routing), etc. For example, a security policy may indicate user A, using computing device B executing process C with process signature S (e.g., a signing signature thumbprint, etc.) may access private resource D. A process identity may be indicated by at least one of a process name, a code signing signature, a thumbprint, a process version, or a process publisher. Resource access security policy determinations and/or enforcement may be performed by security clients and/or security engines (e.g.Type: ApplicationFiled: August 16, 2022Publication date: February 22, 2024Inventors: Ashish JAIN, Ronnie GREENSTEIN, Mordhai GENDELMAN, Avraham CARMON, Sinead C. O'DONOVAN, Yair TOR
-
Patent number: 11899520Abstract: A technique for operating a cache is disclosed. The technique includes in response to a power down trigger that indicates that the cache effectiveness is considered to be low, powering down the cache.Type: GrantFiled: April 26, 2022Date of Patent: February 13, 2024Assignees: Advanced Micro Devices, Inc., ATI Technologies ULCInventors: Ashish Jain, Benjamin Tsien, Chintan S. Patel, Vydhyanathan Kalyanasundharam, Shang Yang