Patents by Inventor Ashish .

Ashish . has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12184519
    Abstract: In one embodiment, an illustrative method herein may comprise: sending, from a server instrumentation agent configured on a transaction server, instrumented server performance data regarding the transaction server and an associated correlation token to an application programming interface (API) monitoring agent; receiving, at the server instrumentation agent, a returned acknowledgment of the instrumented server performance data regarding the transaction server and the associated correlation token from the API monitoring agent, the acknowledgement also having corresponding API monitored performance data regarding an API of the transaction server; returning, from the server instrumentation agent, a synchronization acknowledgment to the API monitoring agent in response to the returned acknowledgment to indicate complete synchronization; and correlating, by the server instrumentation agent, the instrumented server performance data regarding the transaction server and the API monitored performance data regarding t
    Type: Grant
    Filed: May 13, 2022
    Date of Patent: December 31, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Darshan Deepak Digikar, Mayank Jain, Ashish Mishra
  • Patent number: 12178569
    Abstract: A medical device may include a handle assembly having an actuator and a sheath. The sheath may extend between a proximal end and a distal end. The proximal end of the sheath may be coupled with the actuator. The medical device may further include an end-effector moveable relative to the sheath between an extended configuration and a retracted configuration. The end-effector may include a plurality of expandable legs. Each of the plurality of expandable legs may include a plurality of first indicia and a plurality of second indicia. A color of each of the first plurality of indicia may be different than a color of each of the second plurality of indicia.
    Type: Grant
    Filed: October 19, 2022
    Date of Patent: December 31, 2024
    Assignee: Boston Scientific Medical Device Limited
    Inventors: Ashish Jain, Denise C. Lane
  • Patent number: 12182776
    Abstract: Math-based currency (“MBC”) transactions are inherently quasi-anonymous. Systems and methods of registering customers with a financial institution for the purposes of opening a MBC account are described. During the registration process, the financial institution gathers and stores certain information relating to the customers having MBC accounts. This information may later be used to provide verification of MBC transactions to other parties involved in the MBC transactions.
    Type: Grant
    Filed: November 8, 2021
    Date of Patent: December 31, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Ashish B. Kurani, Andrew Martinez
  • Publication number: 20240429126
    Abstract: Embodiments of the disclosure are in the field of integrated circuit structure fabrication. In an example, an integrated circuit structure includes a plurality of conductive lines, individual ones of the plurality of conductive lines having a liner including molybdenum (Mo), and a fill including tungsten (W). The integrated circuit structure also includes an inter-layer dielectric (ILD) structure having portions between adjacent ones of the plurality of conductive lines.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Inventors: Jeffrey S. LEIB, Daniel B. O’BRIEN, Jennifer ZAVESTOSKI, Hye Kyung KIM, Caitlin Kilroy, Cortnie Vogelsberg, Abha Gosavi, Ashish Bhattarai
  • Publication number: 20240423720
    Abstract: A method of visualization during orthopaedic surgery. The method includes the step of a pre-operative planning step comprising displaying an initial three-dimensional image depicting anatomical features of a patient's bone. The image is retrieved by undertaking imaging or scanning of the patient's bone. The image is processed using a processor operable to carry out one or more image processing steps to generate a modified three-dimensional image. A mixed reality visualization device receives the modified three-dimensional image. The method also includes the step of displaying the modified three-dimensional image, via the mixed reality visualization device, and overlaying the modified three-dimensional image on or adjacent the anatomical features of the patient's bone to provide a visual guide to a surgeon while conducting surgery.
    Type: Application
    Filed: October 28, 2021
    Publication date: December 26, 2024
    Inventors: Ashish Gupta, Marine Mathilde Madeleine Launay
  • Publication number: 20240428477
    Abstract: A computer-implemented method of providing a temporal sequence of 3D angiographic images (110) representing a flow of a contrast agent through a region of interest (120), is provided. The method includes: inputting (S130) volumetric image data (130a, 130b), and a temporal sequence of 2D angiographic images (140) into a neural network (NN1); and generating (S140) the predicted temporal sequence of 3D angiographic images (110) representing the flow of the contrast agent through the region of interest (120) in response to the inputting.
    Type: Application
    Filed: November 3, 2022
    Publication date: December 26, 2024
    Inventors: LEILI SALEHI, AYUSHI SINHA, RAMON QUIDO ERKAMP, GRZEGORZ ANDRZEJ TOPOREK, ASHISH SATTYAVRAT PANSE
  • Publication number: 20240427587
    Abstract: A system for updating a security patch based on simulating different security protocols across multiple machines is disclosed. The system communicates malicious network traffic to testing computing devices. The system triggers execution of a first security protocol to a first testing computing device and a second security protocol to a second testing computing device. The first security protocol is configured to implement a first software instruction. The second security protocol is configured to implement a second software instruction. The system determines that the first software instruction is configured to counter the effect of the malicious network traffic. The system determines that the second software instruction is associated with an anomaly. In response, the system communicates the first security protocol and an instruction that causes the execution of the first security protocol to user devices.
    Type: Application
    Filed: June 22, 2023
    Publication date: December 26, 2024
    Inventors: Camilla Tyborowski, Adam Kristian King, Tarani Avasarala, Manil Ashish Trivedi, Robert Hannon Sparks, Jose Miguel Magadan, III, Elizabeth Marie Bennett, Sophia Brianna Bui, Rafael Josue Alfaro
  • Publication number: 20240430278
    Abstract: A system for detecting and addressing security threats is disclosed. The system detects incoming network traffic to a computing device. The system detects physical and digital effects of the network traffic on the computing device. The system determines that the network traffic is causing a first set of anomalies based on the physical and digital effects of the network traffic. The system compares the first set of anomalies with a second set of anomalies associated with previously known malicious network traffic. If the system determines that more than a threshold percentage of the first set of anomalies corresponds to counterpart anomalies from the second set of anomalies, the system determines that the network traffic corresponds to the malicious network traffic. The system communicates a security patch associated with the second set of anomalies and instructions that cause the security patch to be executed to the computing device.
    Type: Application
    Filed: June 22, 2023
    Publication date: December 26, 2024
    Inventors: Camilla Tyborowski, Adam Kristian King, Tarani Avasarala, Manil Ashish Trivedi, Robert Hannon Sparks, Jose Miguel Magadan, III, Elizabeth Marie Bennett, Sophia Brianna Bui, Rafael Josue Alfaro
  • Publication number: 20240428238
    Abstract: One or more computing devices, systems, and/or methods for performing entity actions based upon inputs received via email interfaces are provided. For example, an email received by an email account may be identified. The email may be associated with an entity action corresponding to a first entity. A selectable input corresponding to performing the entity action may be displayed via an email interface associated with the email account. A request to perform the entity action may be received via a selection of the selectable input. Responsive to receiving the request, an action interface corresponding to performing the entity action may be displayed within the email interface. One or more inputs associated with the entity action may be received via the action interface. Responsive to determining that the entity action is completed, a confirmation message, indicative of the entity action being completed, may be displayed using the email interface.
    Type: Application
    Filed: September 9, 2024
    Publication date: December 26, 2024
    Inventors: Mohit Goenka, Ashish Khushal Dharamshi, Nikita Varma, Gnanavel Shanmugam
  • Publication number: 20240423882
    Abstract: The present invention relates to a personal cleansing composition that provides improved SPF. Particularly, the composition comprises water-soluble UVA sunscreen, water-soluble UVB sunscreen; and an alkali. The invention also relates to a method of and use for providing improved SPF.
    Type: Application
    Filed: November 8, 2022
    Publication date: December 26, 2024
    Applicant: Conopco, Inc., d/b/a UNILEVER
    Inventors: Praful Gulab Rao LAHORKAR, Rajkumar PERUMAL, Ashish Anant VAIDYA
  • Publication number: 20240427681
    Abstract: In an example method, a system receives diagnostic data from a plurality of electronic devices, the diagnostic data representing resource usage by applications on the plurality of electronic devices, application names associated with the applications, application version identifiers associated with the applications, and call-stacks associated with the resource usage by the applications. The system categorizes the resource usage based on the application names, the application version identifiers, and the call-stacks, including determining signatures based on the call-stacks, and categorizing the resource usage based on the signatures, the application names, and the application version identifiers. Further, the system generates a data set representing the categorization of the resource usage.
    Type: Application
    Filed: January 4, 2024
    Publication date: December 26, 2024
    Inventors: Akhil Bhutani, Anshul Dawra, Shreyas Binnamangala Prabhu, Phillip J. Azar, Ashish Patro, Alex W. Fu
  • Publication number: 20240427743
    Abstract: An example computer system for data pipeline orchestration configured to manage and coordinate the end-to-end process involved in moving and transforming data from various sources to designated target repositories can include one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a user interface configured to receive metadata configuration requirements; a parsing module programmed to parse the metadata configuration requirements into one or more constituent components; and a template selection module programmed identify and select appropriate templates from a template repository used to fulfill the one or more constituent components.
    Type: Application
    Filed: June 22, 2023
    Publication date: December 26, 2024
    Inventors: Vijay Anusuri, MaiLin Jan, Ramesh H. Joshi, Sameer M. Joshi, Suresh Kumar, Ashish Lahoti, Cedric Lamielle, Hargurjit S. Malhi, Lakshmikanth Nagapudi
  • Publication number: 20240430165
    Abstract: Various systems and methods for cellular network slice management are presented. An application may be determined to be authorized to manage a cellular network slice utilized by the application for communication with user equipment. A request can be received from the application to modify the cellular network slice from the application. In response to the request, a parameter of the cellular network slice may be modified. The cellular network can then use the modified slice for communication with user equipment for the cloud-based application.
    Type: Application
    Filed: September 4, 2024
    Publication date: December 26, 2024
    Inventors: Ashish Bansal, Siddhartha Chenumolu, Paul-André Raymond
  • Publication number: 20240430280
    Abstract: A computer-implemented method for proactively detecting and remediating anomalous devices includes accessing, via a network, device attributes corresponding to enterprise devices within an enterprise network, providing the device attributes to a supervised machine learning model, and predicting, via the supervised machine learning model, whether each enterprise device is healthy or anomalous, where the enterprise device is predicted to be healthy unless the supervised machine learning model determines that the probability of the enterprise device being anomalous exceeds a specified confidence threshold. The method includes, for each enterprise device that is predicted to be anomalous, perturbing a portion of the corresponding device attributes via an automated counterfactual generator to generate synthetic data representative of counterfactual healthy devices.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Inventors: Mawulolo Koku AMEKO, Kabir WALIA, Jyh-Han LIN, Vivek GUPTA, Ehimwenma NOSAKHARE, Sean Gormley T. KELLEY, Ashish NEUPANE, Jenna HONG
  • Publication number: 20240424500
    Abstract: A cartridge for use with chemical or biological analysis systems, as well as methods of using the same, is provided. The cartridge may include a floating microfluidic plate that is held in the cartridge using one or more floating support brackets that incorporate gaskets that may seal against fluidic ports on the microfluidic plate. The floating support brackets may include indexing features that may align the microfluidic plate with the seals.
    Type: Application
    Filed: September 6, 2024
    Publication date: December 26, 2024
    Inventors: David Elliott Kaplan, Anthony John de Ruyter, Richard Alan Kelley, Ashish Kumar
  • Publication number: 20240430685
    Abstract: An example method for identifying one or more potential malicious activities in a software-defined open radio access network includes detecting, by a trusted monitoring device, a communication flow from a sender component to a receiver component via an intermediate component. The method also includes, in response to the detecting of the communication flow, generating, by the trusted monitoring device and utilizing an intermediate identifier associated with the intermediate component, a flow record based on one or more parameters associated with the communication flow. The method further includes providing, by the trusted monitoring device and based on the flow record, an indication of the one or more potential malicious activities in the software-defined open radio access network.
    Type: Application
    Filed: June 20, 2024
    Publication date: December 26, 2024
    Inventors: Ashish Gehani, Vinod Trivandrum Yegneswaran, Phillip Andrew Porras
  • Publication number: 20240427680
    Abstract: Techniques are described for a data recovery validation test. In examples, a processor receives a command to be included in the validation test that is configured to validate performance of an activity by a server prior to a failure to perform the activity by the server. The processor stores the validation test including the command on a memory device, and prior to the failure of the activity by the server, executes the validation test including the command responsive to an input. The processor receives results of the validation test corresponding to the command and indicating whether the server performed the activity in accordance with a standard for the activity during the validation test. The processor provides the results of the validation test in a user interface.
    Type: Application
    Filed: August 28, 2024
    Publication date: December 26, 2024
    Inventors: Victoria Michelle Passmore, Cesar Bryan Acosta, Christopher Chickoree, Mason Davenport, Ashish Desai, Sudha Kalyanasundaram, Christopher R. Lay, Emre Ozgener, Steven Stiles, Andrew Warner
  • Publication number: 20240428320
    Abstract: An online system receives a request to confirm a transaction that is associated with an order. The system accepts or declines the transaction based on whether an amount associated with the pending transaction is likely to exceed an expected amount of the order by more than a threshold value. To determine the threshold, the system trains a first model to predict an overspend for an order and then trains a second model to predict an amount of error associated with the predictions from the first model. The outputs of the first model and the second model provide a mean and a variance for an expected distribution of the overspend. If the actual overspend amount for the transaction exists in too high of a percentile of the distribution, the transaction may be flagged for review or declined.
    Type: Application
    Filed: June 23, 2023
    Publication date: December 26, 2024
    Inventors: Rebecca Riso, Bo Xu, Kenneth Jason Sanchez, Ashish Sinha, Chencheng Wu
  • Patent number: 12175462
    Abstract: An example operation may include one or more of receiving, by a resolver node, asset data to be recorded on a blockchain, executing, by the resolver node, a smart contract to apply an asset data validation format to the asset data, rejecting, by the resolver node, non-conforming asset data from being stored on the blockchain based on the execution of the smart contract, and accepting the asset data validated by the smart contract.
    Type: Grant
    Filed: February 21, 2020
    Date of Patent: December 24, 2024
    Assignee: International Business Machines Corporation
    Inventors: Krishna Chaitanya Ratakonda, Ashish Jagmohan
  • Patent number: 12175454
    Abstract: Systems, methods, and computer-readable storage media to protect non-fungible tokens (NFTs) using a protection architecture. One method includes receiving an NFT, authenticating the NFT including authenticating or verifying the NFT using a key and authenticating the link of the NFT, and protecting the NFT including generating a public-private key pair, encapsulating the NFT within a control structure, updating an NFT account in an overlay ledger, generating and storing a cold storage object in a cold storage ledger, and broadcasting the NFT to a blockchain storage.
    Type: Grant
    Filed: December 2, 2022
    Date of Patent: December 24, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Ashish B. Kurani, Dennis E. Montenegro