Patents by Inventor Ashish Jain

Ashish Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180234816
    Abstract: Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. Applications for which the user is authorized are identified. An enrollment level associated with each of the plurality of applications is also identified. A user interface including the plurality of applications and the enrollment level associated with each of the plurality of applications is generated.
    Type: Application
    Filed: April 16, 2018
    Publication date: August 16, 2018
    Inventors: Adam Stephen Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy, Pratik Jagad, Krishna Kumar Bhavesh
  • Patent number: 10021542
    Abstract: Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. Applications for which the user is authorized are identified. An enrollment level associated with each of the plurality of applications is also identified. A user interface including the plurality of applications and the enrollment level associated with each of the plurality of applications is generated.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: July 10, 2018
    Assignee: AirWatch LLC
    Inventors: Adam Stephen Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy, Pratik Jagad, Krishna Kumar Bhavesh
  • Publication number: 20180145968
    Abstract: Disclosed are various examples for providing a single sign-on experience for managed mobile devices. A management application executed in a computing device receives a single sign-on request from a managed client application executed by the same computing device. The management application determines that the client application is permitted to access a management credential for single sign-on use. The management application provides the management credential to the client application in response to the single sign-on request.
    Type: Application
    Filed: January 19, 2018
    Publication date: May 24, 2018
    Inventors: Adam Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy, Jonathan Blake Brannon, Camilo Lotero
  • Patent number: 9958921
    Abstract: A method includes controlling a power limit of a computing system based on a determined skin temperature of at least one location on an outer surface of a device housing the computing system. A processor includes a processing unit and a power management controller to control a power limit of the processing unit based on a determined skin temperature of at least one location on an outer surface of a device housing the processor.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: May 1, 2018
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Ashish Jain, Benjamin David Bates, Ali Akbar Merrikh, Samuel David Naffziger, Steven Frederick Liepe, Madhu Saravana Sibi Govindan
  • Patent number: 9917838
    Abstract: Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. Applications for which the user is authorized are identified. An enrollment level associated with each of the plurality of applications is also identified. A user interface including the plurality of applications and the enrollment level associated with each of the plurality of applications is generated.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: March 13, 2018
    Assignee: AIRWATCH LLC
    Inventors: Adam Stephen Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy
  • Patent number: 9882887
    Abstract: Disclosed are various examples for providing a single sign-on experience for managed mobile devices. A management application executed in a computing device receives a single sign-on request from a managed client application executed by the same computing device. The management application determines that the client application is permitted to access a management credential for single sign-on use. The management application provides the management credential to the client application in response to the single sign-on request.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: January 30, 2018
    Assignee: AirWatch LLC
    Inventors: Adam Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy, Jonathan Blake Brannon, Camilo Lotero
  • Publication number: 20170346812
    Abstract: Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. In addition, a device posture assessment that analyzes the device from which the authentication request originates is also performed. An authentication request can be authenticated based upon whether the device posture assessment reveals that device to be a managed device that is in compliance with compliance rules.
    Type: Application
    Filed: May 31, 2016
    Publication date: November 30, 2017
    Inventors: Craig Farley Newell, Jonathan Blake Brannon, Kabir Barday, Ashish Jain
  • Publication number: 20170346856
    Abstract: Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. In addition, a device posture assessment that analyzes the device from which the authentication request originates is also performed. An authentication request can be authenticated based upon whether the device posture assessment reveals that device to be a managed device that is in compliance with compliance rules.
    Type: Application
    Filed: May 31, 2016
    Publication date: November 30, 2017
    Inventors: Craig Farley Newell, Jonathan Blake Brannon, Kabir Barday, Ashish Jain
  • Publication number: 20170346811
    Abstract: Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. In addition, a device posture assessment that analyzes the device from which the authentication request originates is also performed. An authentication request can be authenticated based upon whether the device posture assessment reveals that device to be a managed device that is in compliance with compliance rules.
    Type: Application
    Filed: May 31, 2016
    Publication date: November 30, 2017
    Inventors: Craig Farley Newell, Jonathan Blake Brannon, Kabir Barday, Ashish Jain
  • Publication number: 20170303940
    Abstract: A percutaneous nephrolithotomy (PCNL) needle may include a cannula including a shaft and a cannula hub coupled to a proximal end of the cannula shaft. A depth guide may be disposed on an outer surface of the cannula shaft. A stylet may be disposable within the cannula lumen and may include a tapered point at a distal end of the stylet and a stylet hub coupled to a proximal end of the stylet that is configured to be releasably securable to the cannula hub. An adjustable depth stop may be releasably securable to the cannula shaft at a desired position relative to the depth guide, the adjustable depth guide capable of being manipulated between an adjustment configuration in which the adjustable depth guide is moveable relative to the cannula shaft and a secured configuration in which the adjustable depth guide is secured relative to the cannula shaft.
    Type: Application
    Filed: April 25, 2017
    Publication date: October 26, 2017
    Inventors: ERIK E. SPERRY, JERRY T. LONG, JR., RONALD CIULLA, TIMOTHY P. HARRAH, AARON K. KIRKEMO, KENNETH P. REEVER, BRANDON W. CRAFT, ELIZABETH A. STOKLEY, SEBASTIAN KOERNER, CHAD SCHNEIDER, ANANT SUBRAMANIAM, ASHISH JAIN, DIPANKA MEDHI, SUMIT MALIK, SUBODH MOREY, BITEN K. KATHRANI, Salman Kapadia
  • Publication number: 20170300101
    Abstract: A power management module of a processor places a compute unit in a low power mode (e.g., an idle mode) in response to identifying that the compute unit is expected to experience little to no processing activity for a threshold amount of time. In response to receiving an indication from a message controller that a message is targeted to the compute unit, the power management module selects a different compute unit that is presently in an active power mode and provides the message to the selected compute unit for processing. The compute unit can be selected based on any of a variety of criteria, such as the compute unit being in a stall condition, an indication from a performance monitor that the compute unit is executing a relatively inefficient program thread, and the like.
    Type: Application
    Filed: April 14, 2016
    Publication date: October 19, 2017
    Inventors: Alexander J. Branover, Ashish Jain, Mom Eng Ng
  • Patent number: 9785218
    Abstract: A power management controller tracks the idle state of a compute unit and compares the tracked idle state with a first threshold. If the tracked idle state is above the first threshold a power state of the compute unit is limited to a low power state so that the power state does not rise due to activity that occurs in low utilization scenarios. The tracked idle state is compared to a second threshold and if the tracked idle state is below the second threshold, indicating that the compute unit is not in a low utilization scenario, a limit on the power state is removed and the power state of the compute unit is allowed to rise.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: October 10, 2017
    Assignees: Advanced Micro Devices, Inc., ATI Technologies ULC
    Inventors: Alexander J. Branover, Adam N. C. Clark, Ashish Jain, Sridhar V. Gada
  • Patent number: 9697211
    Abstract: Techniques for creating and using a hierarchical data structure, in accordance with embodiments of the present invention include storing received data as records in a first level of the hierarchical data structure. One or more parameters for each block of records in the first level are summarized and stored in a second level of the hierarchical data structure. The techniques may also include querying a given level of a hierarchical data structure. One or more blocks of records one level below the given level are accessed. Each of the accessed blocks correspond to records that are summarized by records in the given level that satisfies the query.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: July 4, 2017
    Assignee: Synopsys, Inc.
    Inventors: Dirk Vermeersch, Ashish Jain
  • Publication number: 20170063857
    Abstract: Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. Applications for which the user is authorized are identified. An enrollment level associated with each of the plurality of applications is also identified. A user interface including the plurality of applications and the enrollment level associated with each of the plurality of applications is generated.
    Type: Application
    Filed: August 28, 2015
    Publication date: March 2, 2017
    Inventors: Adam Stephen Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy
  • Publication number: 20170064549
    Abstract: Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. Applications for which the user is authorized are identified. An enrollment level associated with each of the plurality of applications is also identified. A user interface including the plurality of applications and the enrollment level associated with each of the plurality of applications is generated.
    Type: Application
    Filed: August 28, 2015
    Publication date: March 2, 2017
    Inventors: Adam Stephen Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy, Pratik Jagad, Krishna Kumar Bhavesh
  • Publication number: 20160378168
    Abstract: Systems, apparatuses, and methods for managing power usage of integrated circuits. One or more processor cores may be powered down when the system is idle. Even if there is no user activity, the processor core(s) may be woken up periodically for background downloads to retrieve the latest status for social media and other applications. Additionally, a power management unit may track the average number of active cores and the average core utilization. If the average number of active cores is less than a first threshold and the average core utilization is less than a second threshold, the power management unit may generate a request to offline one or more cores. Still further, when the processor's skin temperature is above a threshold and all of the cores are operating at the lowest acceptable operating point, one or more cores may be powered down.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 29, 2016
    Inventors: Alexander J. Branover, Ashish Jain, Sridhar V. Gada
  • Publication number: 20160366122
    Abstract: Disclosed are various examples for providing a single sign-on experience for mobile devices that may or may not be managed. A service provider receives an access request from a first client application executed in a client device. The service provider causes the first client application, using a redirection response that redirects the access request to an identity provider, to request an authentication token from a second client application executed in the client device. The service provider receives the authentication token from the first client application. The service provider then authenticates the first client application in response to verifying the authentication token.
    Type: Application
    Filed: June 15, 2015
    Publication date: December 15, 2016
    Inventors: Adam Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy
  • Publication number: 20160366120
    Abstract: Disclosed are various examples for single-sign on by way of managed mobile devices. For example, an identity provider service can receive a request for an identity assertion from an application executed in a client device. The identity provider service can then detect a platform associated with the client device. A response to the request can be sent based at least in part on the platform, where the response requests authentication by a management credential. Data generated by the management credential is received from the client device, and the management credential is determined to be valid for the identity assertion. The identity assertion is then sent to the client device in response to determining that the management credential is valid for the identity assertion.
    Type: Application
    Filed: June 15, 2015
    Publication date: December 15, 2016
    Inventors: Adam Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy, Jonathan Blake Brannon, Camilo Lotero
  • Publication number: 20160366119
    Abstract: Disclosed are various examples for providing a single sign-on experience for mobile applications that may or may not be managed. A first application executed in a client device sends an access request to a service provider. The first application receives a redirection response from the service provider that redirects the first application to an identity provider. The first application then receives a further redirection response from the identity provider that causes the first application to request an identity assertion from a second application executed in the client device. The first application receives the identity assertion from the second application. The first authentication then authenticates with the service provider using the identity assertion.
    Type: Application
    Filed: June 15, 2015
    Publication date: December 15, 2016
    Inventors: Adam Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy
  • Publication number: 20160366121
    Abstract: Disclosed are various examples for providing a single sign-on experience for managed mobile devices. A management application executed in a computing device receives a single sign-on request from a managed client application executed by the same computing device. The management application determines that the client application is permitted to access a management credential for single sign-on use. The management application provides the management credential to the client application in response to the single sign-on request.
    Type: Application
    Filed: June 15, 2015
    Publication date: December 15, 2016
    Inventors: Adam Rykowski, Ashish Jain, Dale Robert Olds, Emily Hong Xu, Kabir Barday, Kyle Austin, Sridhara Babu Kommireddy, Jonathan Blake Brannon, Camilo Lotero