Patents by Inventor Balbir Singh
Balbir Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240351519Abstract: Methods and systems for a vehicle of a remote transportation system. A vehicle includes a non-transitory computer readable media and one or more processors configured by programming instructions on the non-transitory computer readable media to: coordinate a platooning operation between the first vehicle and a second vehicle; monitor an environment of the first vehicle and the second vehicle while platooning; in response to the monitoring, determine a threat level vassociated with a cut-in operation of at least one object within the environment; and selectively activate at least one visual or audio cue based on the threat level to avoid the cut-in operation.Type: ApplicationFiled: April 21, 2023Publication date: October 24, 2024Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Joseph K. Moore, Balbir Singh Sangha, Mansoor Alghooneh, Terry W. Ostan, Anthony J. Corsetti
-
Publication number: 20240314088Abstract: Techniques discussed herein include providing a cloud computing environment in which applications are deployed by a deployment orchestrator using virtual-machine-based virtualization with a static pool of computing nodes (e.g., substrate nodes, overlay nodes) and container-based virtualization with a dynamic pool of computing nodes (e.g., nodes managed by a container orchestration platform). Components of a data plane may be used to deploy containers to micro-virtual machines. A container runtime interface (CRI) may receive a deployment request from the deployment orchestrator. A container networking interface of the data plane may configure network connections and allocate an IP address for the container. A container runtime of the data pane may generate and configure the container with the IP address and run the container within a micro-virtual machine that is compatible with the container orchestration platform.Type: ApplicationFiled: May 23, 2024Publication date: September 19, 2024Applicant: Oracle International CorporationInventors: Quintin Lee, Amr Mohamed AbdelHamid, Balbir Singh, Olga Kechina
-
Patent number: 12034647Abstract: Techniques discussed herein include providing a cloud computing environment in which applications are deployed by a deployment orchestrator using virtual-machine-based virtualization with a static pool of computing nodes (e.g., substrate nodes, overlay nodes) and container-based virtualization with a dynamic pool of computing nodes (e.g., nodes managed by a container orchestration platform). Components of a data plane may be used to deploy containers to micro-virtual machines. A container runtime interface (CRI) may receive a deployment request from the deployment orchestrator. A container networking interface of the data plane may configure network connections and allocate an IP address for the container. A container runtime of the data pane may generate and configure the container with the IP address and run the container within a micro-virtual machine that is compatible with the container orchestration platform.Type: GrantFiled: August 28, 2023Date of Patent: July 9, 2024Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Quintin Lee, Amr Mohamed AbdelHamid, Balbir Singh, Olga Kechina
-
Publication number: 20240080277Abstract: Techniques discussed herein include providing a cloud computing environment in which applications are deployed by a deployment orchestrator using virtual-machine-based virtualization with a static pool of computing nodes (e.g., substrate nodes, overlay nodes) and container-based virtualization with a dynamic pool of computing nodes (e.g., nodes managed by a container orchestration platform). Components of a data plane may be used to deploy containers to micro-virtual machines. A container runtime interface (CRI) may receive a deployment request from the deployment orchestrator. A container networking interface of the data plane may configure network connections and allocate an IP address for the container. A container runtime of the data pane may generate and configure the container with the IP address and run the container within a micro-virtual machine that is compatible with the container orchestration platform.Type: ApplicationFiled: August 28, 2023Publication date: March 7, 2024Applicant: Oracle International CorporationInventors: Quintin Lee, Amr Mohamed AbdelHamid, Balbir Singh, Olga Kechina
-
Publication number: 20240080242Abstract: Techniques discussed herein include providing a cloud computing environment in which applications are deployed using virtual-machine-based virtualization with a static pool of computing nodes (e.g., substrate nodes, overlay nodes) and container-based virtualization with a dynamic pool of computing nodes (e.g., nodes managed by a container orchestration platform). The control plane functionality may be invoked by a deployment orchestrator (e.g., using a client of the container orchestration platform). In some embodiments, the control plane may include a set of applications that are configured to communicate with core services for certificate generation and rotation, namespace and quota management, metric monitoring and alarming, node authentication, and cluster membership management.Type: ApplicationFiled: August 28, 2023Publication date: March 7, 2024Applicant: Oracle International CorporationInventors: Quintin Lee, Amr Mohamed AbdelHamid, Balbir Singh, Olga Kechina
-
Patent number: 11724746Abstract: A chassis assembly having mixed material for reduced mass is provided. The assembly comprises an upper structure comprised of metal. The upper structure has a plurality of first bond surfaces, each of which is parallel with each other at varying elevations relative to a z-axis of a 3-dimensional coordinate thereof. The assembly further comprises a lower structure made of a polymer composite. The lower structure has a plurality of second bond surfaces, each of which is parallel with each other at varying elevations relative to the z-axis thereof. The second bond surfaces are arranged to align with the first bond surfaces in complementing relation such that the lower structure is joined with the upper structure at the first and second bond surfaces. The assembly further comprises an adhesive disposed between the first and second bond surfaces to join the lower and upper structures at the first and second bond surfaces, defining a bond gap between the first and second bond surfaces.Type: GrantFiled: October 13, 2021Date of Patent: August 15, 2023Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Balbir Singh Sangha, Len V. Peschansky, Manish Pamwar, Fred M. Marquardt, William R. Rodgers, Bruce N. Greve, David Kennedy, Adrian Bica, Bikramjit Sarkaria
-
Publication number: 20230119950Abstract: The present disclosure generally relates to a system and method for providing audio and image data. The system and method may receive blurbs from users that include audio and image data. The exemplary disclosed system and method may prioritize or push a given blurb based on consumption by other users. The exemplary disclosed system and method may further prioritize or push a given blurb based on an aggregate metric based on consumption and engagement by other users.Type: ApplicationFiled: October 19, 2022Publication date: April 20, 2023Inventors: Eriz Gonzales De Zarate Lopez, Mohammad Aladham, Manmohan Singh Balbir Singh
-
Publication number: 20230110672Abstract: A chassis assembly having mixed material for reduced mass is provided. The assembly comprises an upper structure comprised of metal. The upper structure has a plurality of first bond surfaces, each of which is parallel with each other at varying elevations relative to a z-axis of a 3-dimensional coordinate thereof. The assembly further comprises a lower structure made of a polymer composite. The lower structure has a plurality of second bond surfaces, each of which is parallel with each other at varying elevations relative to the z-axis thereof. The second bond surfaces are arranged to align with the first bond surfaces in complementing relation such that the lower structure is joined with the upper structure at the first and second bond surfaces. The assembly further comprises an adhesive disposed between the first and second bond surfaces to join the lower and upper structures at the first and second bond surfaces, defining a bond gap between the first and second bond surfaces.Type: ApplicationFiled: October 13, 2021Publication date: April 13, 2023Inventors: Balbir Singh Sangha, Len V. Peschansky, Manish Pamwar, Fred M. Marquardt, William R. Rodgers, Bruce N. Greve, David Kennedy, Adrian Bica, Bikramjit Sarkaria
-
Patent number: 10909236Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.Type: GrantFiled: May 24, 2019Date of Patent: February 2, 2021Assignee: McAfee, LLCInventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
-
Patent number: 10885183Abstract: A computer implemented method for preventing return-oriented programming (ROP) attacks includes registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks, identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat, instrumenting the one or more critical regions with ROP protection mechanisms, detecting a critical function execution attempt on one or more of the identified critical regions, determining whether values associated with the critical function match corresponding expected values, and, responsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism.Type: GrantFiled: September 28, 2017Date of Patent: January 5, 2021Assignee: International Business Machines CorporationInventor: Balbir Singh
-
Patent number: 10878081Abstract: A computer implemented method for preventing return-oriented programming (ROP) attacks includes registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks, identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat, instrumenting the one or more critical regions with ROP protection mechanisms, detecting a critical function execution attempt on one or more of the identified critical regions, determining whether values associated with the critical function match corresponding expected values, and, responsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism.Type: GrantFiled: December 7, 2017Date of Patent: December 29, 2020Assignee: International Business Machines CorporationInventor: Balbir Singh
-
Patent number: 10812466Abstract: Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send the device certificate to a management console for storing in a certificate database. Upon detecting a file of interest, the TPM signs the file, adding to a signature list created by previous managed devices. The signature list can be used to analyze the spread of the file across the system of managed devices, including tracking the file to the first managed device to have had a copy, without requiring real-time access to the managed devices during the spread of the file. In some embodiments, additional security measures may be taken responsive to determining the first managed device and the path the file has taken across the system of managed devices.Type: GrantFiled: May 5, 2015Date of Patent: October 20, 2020Assignee: McAfee, LLCInventors: Balbir Singh, Preet Mohinder, Manish Sharma, Rahul Chandra Khali
-
Publication number: 20190278908Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.Type: ApplicationFiled: May 24, 2019Publication date: September 12, 2019Applicant: McAfee, LLCInventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
-
Patent number: 10339303Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.Type: GrantFiled: January 22, 2015Date of Patent: July 2, 2019Assignee: McAfee, LLCInventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
-
Publication number: 20190095612Abstract: A computer implemented method for preventing return-oriented programming (ROP) attacks includes registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks, identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat, instrumenting the one or more critical regions with ROP protection mechanisms, detecting a critical function execution attempt on one or more of the identified critical regions, determining whether values associated with the critical function match corresponding expected values, and, responsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism.Type: ApplicationFiled: September 28, 2017Publication date: March 28, 2019Inventor: Balbir Singh
-
Publication number: 20190095613Abstract: A computer implemented method for preventing return-oriented programming (ROP) attacks includes registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks, identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat, instrumenting the one or more critical regions with ROP protection mechanisms, detecting a critical function execution attempt on one or more of the identified critical regions, determining whether values associated with the critical function match corresponding expected values, and, responsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism.Type: ApplicationFiled: December 7, 2017Publication date: March 28, 2019Inventor: Balbir Singh
-
Patent number: 10097561Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.Type: GrantFiled: January 11, 2018Date of Patent: October 9, 2018Assignee: McAfee, LLCInventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
-
Patent number: 10050993Abstract: In an example, there is disclosed a security architecture for enhanced, non-invasive whitelisting of executable objects. When an executable object tries to perform an action, a security engine seamlessly intercepts the action and determines whether the action is whitelisted, blacklisted, or graylisted, assigning the action a corresponding security score. Whitelisted actions may be allowed, blacklisted actions may be disallowed, and graylisted actions may require additional verification from a user. Because the score is assigned to the combination of the executable object and the action, false positives may be avoided, such as those that may occur when an executable object is prefetched but has not yet tried to perform any useful work.Type: GrantFiled: September 24, 2014Date of Patent: August 14, 2018Assignee: McAfee, LLCInventors: Amritanshu Johri, Balbir Singh, Jaskaran Khurana, Ratnesh Pandey
-
Publication number: 20180139211Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.Type: ApplicationFiled: January 11, 2018Publication date: May 17, 2018Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
-
Patent number: 9894079Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.Type: GrantFiled: April 25, 2016Date of Patent: February 13, 2018Assignee: McAfee, LLCInventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni