Patents by Inventor Chandra (CP) Agrawal

Chandra (CP) Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12380623
    Abstract: Various implementations disclosed herein include devices, systems, and methods for granular motion control for a virtual agent. In various implementations, a device includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, a method includes obtaining an action for a virtual agent. In some implementations, the action is associated with a plurality of time frames. In some implementations, the method includes, for a first time frame of the plurality of time frames, determining respective confidence scores for a plurality of granular motions that advance the virtual agent towards completion of the action. In some implementations, the method includes selecting a subset of the plurality of granular motions based on the respective confidence scores.
    Type: Grant
    Filed: August 24, 2023
    Date of Patent: August 5, 2025
    Assignee: Apple Inc.
    Inventors: Siva Chandra Mouli Sivapurapu, Aashi Manglik, Edward S. Ahn, Mark Drummond
  • Publication number: 20250245215
    Abstract: This disclosure introduces a novel method and system for using a large language model (LLM) to create a convenient interface for a complex database. The system includes a custom prompt generator that creates custom prompts from natural language queries. The custom prompts are used to control how the LLM interacts with a database look-up tool. The database look-up tool provides queries to the database in a format understandable by the database and receives responses from the database. This system is useful for obtaining information that is not in a natural language, and thus, is poorly suited for being processed as an embedding by the LLM. Information obtained from the database is included in an answer produced by the LLM.
    Type: Application
    Filed: January 31, 2024
    Publication date: July 31, 2025
    Inventors: Maria Angels DE LUIS BALAGUER, Sara Malvar MAUA, Swati SHARMA, Ranveer CHANDRA
  • Publication number: 20250247260
    Abstract: Devices, systems, methods, and processes for transmitting power and managing power transmission are described herein. A device may be configured to transmit power to multiple user devices. The device can receive, from a licensing server, a power utilization license indicative of a power consumption threshold. The device can transmit power to the user devices based on the power utilization license. The device may monitor a power consumption of the user devices. The device can identify a license gap based on a difference in measured power consumption of the user devices and the power consumption threshold. The device may transmit a signed utilization signal indicative of the measured power consumption and the license gap. The licensing server can provide a temporary power utilization license by way of a synchronization response signal. The device can thereby transmit power to the one or more user devices based on the temporary power utilization license.
    Type: Application
    Filed: January 30, 2024
    Publication date: July 31, 2025
    Inventors: Ravi Chandra, Pradeep K. Kathail, Eric A. Voit
  • Publication number: 20250247428
    Abstract: Methods and systems for managing operation of a data processing system are disclosed. To manage operation of the data processing system, a management controller of the data processing system may obtain validated location data for the data processing system via at least an out of band communication channel. The management controller may identify applicable security policies based on the validated location data. If the management controller identifies a security policy applicable to a geographical location of the data processing system, then the management controller may perform an action set to manage operation of the data processing system based on instructions associated with the applicable security policy.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: ADOLFO SANDOR MONTERO, MOHIT ARORA, BASSEM EL-AZZAMI, RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ABEYE TESHOME, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES
  • Publication number: 20250247805
    Abstract: Methods and systems for managing a data processing system are disclosed. To manage the data processing system, a management controller may be included in the data processing system. The management controller may participate in time synchronization for the data processing system. To do so, the management controller may obtain true time values from a trusted time server via an interaction using an out of band communication channel. The true time values may be used to update any number of clocks hosted by the management controller and/or hardware resources of the data processing system. Therefore, software applications may utilize reliable time data to perform computer-implemented services. Doing so may decrease a likelihood of compromise of the data processing system and/or true time values used by the data processing system to perform the computer-implemented services.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: LUIS ANTONIO VALENCIA REYES, RICHARD M. TONRY, ABEYE TESHOME, BASSEM EL-AZZAMI, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, ADOLFO SANDOR MONTERO, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250245353
    Abstract: Methods and systems for managing operations of a data processing system are disclosed. To manage operations of the data processing system, a management controller of the data processing system may obtain validated location data for the data processing system via an out-of-band communication channel. The management controller may identify applicable policies based on the validated location data. If the management controller identifies a policy applicable to a geographical location of the data processing system, then the management controller may perform an action set to manage operation of the data processing system based on instructions associated with the applicable policy. The updated operation of the data processing system may increase the security of sensitive data managed by the data processing system.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: ADOLFO SANDOR MONTERO, MOHIT ARORA, BASSEM EL-AZZAMI, RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ABEYE TESHOME, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES
  • Publication number: 20250246580
    Abstract: Disclosed herein are an integrated circuit die stack and an integrated circuit die package assembly having the integrated circuit die stack. The integrated circuit die stack includes a plurality of integrated circuit dice disposed in a first tier of the die stack and a plurality of integrated circuit dice disposed in a second tier of the die stack. The plurality of integrated circuit dice of the second tier are stacked vertically above the plurality of the integrated circuit dice of the first tier and include a bridge die. The bridge die couples with at least two dice of the first tier and includes an integrated passive device coupled with a routing connection.
    Type: Application
    Filed: January 31, 2024
    Publication date: July 31, 2025
    Inventors: Arsalan ALAM, Chandra Sekhar MANDALAPU, Liwei WANG, Manish DUBEY
  • Publication number: 20250247425
    Abstract: Methods and systems for managing an endpoint device are disclosed. To do so, a key pair may be generated by a management controller of the endpoint device and a private key of the key pair may be kept secret by the management controller. A public key of the public private key pair may be provided to a first entity for use in generating a certificate for the endpoint device. The certificate may be provided to a second entity desiring a level of trust with the endpoint device. As a portion of establishing a secure connection between the second entity and the endpoint device, a TLS handshake may be performed. Performing the TLS handshake may include obtaining a TLS packet, signing the TLS packet using the private key, and providing the signed TLS packet to the second entity to demonstrate that the endpoint device is trustworthy for the level of trust.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: BASSEM EL-AZZAMI, RICHARD M. TONRY, MOHIT ARORA, ABEYE TESHOME, VINODKUMAR VASUDEV OTTAR, ADOLFO SANDOR MONTERO, LUIS ANTONIO VALENCIA REYES, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250247430
    Abstract: Methods and systems for managing a data processing system are disclosed. Motion data for the data processing system may be usable to characterize a gait pattern for a person transporting the data processing system while the motion data is obtained. A management controller of the data processing system may perform a motion analysis process using the motion data to determine whether the gait pattern of the motion data is expected for the data processing system. If the gait pattern is not expected for the data processing system, then the data processing system may be subject to unauthorized transport, which may negatively impact the security of the data processing system. In response, the management controller may initiate performance of an action set in order to place the data processing system in an elevated security state.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: ABEYE TESHOME, RICHARD M. TONRY, BASSEM EL-AZZAMI, ADOLFO SANDOR MONTERO, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, RAJARAVI CHANDRA KOLLARAPU, AMY CHRISTINE NELSON
  • Publication number: 20250245334
    Abstract: Methods and systems for managing firmware update events for data processing systems are disclosed. A firmware update event may indicate that an updated firmware image is available for hardware resources of a data processing system. A management controller for the data processing system may utilize an out of band communication channel to obtain the updated firmware image from a server while bypassing hardware resources of the data processing system. The updated firmware image may be verified, stored, and utilized to update firmware for the hardware resources to obtain an updated data processing system. The updated data processing system may provide computer-implemented services.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: BASSEM EL-AZZAMI, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES, ABEYE TESHOME, ADOLFO SANDOR MONTERO, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250246543
    Abstract: Voltage contrast (VC) image simulation capability and associated test structures are described. In an example, a circuit structure includes an inter-layer dielectric (ILD) layer. A plurality of unidirectional wires is in the ILD layer. In one specific example, the integrated circuit structure includes one or more additional wires in the ILD layer, the one or more additional wires along a direction different than a direction of the plurality of unidirectional wires, and the one or more additional wires are each continuous with a corresponding one of the plurality of unidirectional wires at a location between ends of the corresponding one of the plurality of unidirectional wires. In another specific example, one or more of the plurality of unidirectional wires have a line width transition therein.
    Type: Application
    Filed: June 27, 2024
    Publication date: July 31, 2025
    Inventors: Dipto THAKURTA, Gaurav RAJAVENDRA REDDY, Chaitanya Sai Chandra UMMADISETTY, Bhargav KORRAPATI
  • Publication number: 20250246902
    Abstract: An apparatus includes a solid state circuit breaker selectively configured as a closed switch or an open switch. A current sensor is coupled to a current path passing through the closed switch and configured to sense an electrical current flowing on the current path while the switch is closed. A student convolutional neural network (CNN) model is pretrained using a knowledge distillation-based teacher-student approach. The student CNN model is coupled to the solid state circuit breaker and the current sensor and configured to process data representative of the electrical current, the data being processed cyclically with a period defined by an arc fault detection cycle. According to some aspects, in response to the student CNN model detecting, in association with the electrical current, an arc fault lasting a predetermined number of consecutive arc fault detection cycles, the solid state circuit breaker is reconfigured as the open switch.
    Type: Application
    Filed: January 30, 2025
    Publication date: July 31, 2025
    Inventors: Tiefu ZHAO, Kamal Chandra PAUL, Shen En CHEN
  • Publication number: 20250245442
    Abstract: This disclosure describes a causal query system that determines causal outcomes for agriculture-based causal queries using one or more deep causal machine-learning models, including deep multimodal causal machine-learning models. For example, the causal query system generates one or more deep causal machine-learning models to determine targeted causal outcomes based on combinations of treatments and covariates. Additionally, in many instances, these deep causal machine-learning models also allow for various types of data input, such as overhead images and unstructured data.
    Type: Application
    Filed: January 25, 2024
    Publication date: July 31, 2025
    Inventors: Swati SHARMA, Ranveer CHANDRA, Emre Mehmet KICIMAN, Maria Angels DE LUIS BALAGUER, Shachi Shailesh DESHPANDE
  • Publication number: 20250247220
    Abstract: Methods and systems for establishing trust between an endpoint device and a server are disclosed. To do so, a key pair may be generated by a management controller of the endpoint device and a private key of the key pair may be kept secret by the management controller. A software agent hosted by hardware resources of the endpoint device may generate a data package which may be signed by the management controller using the private key. The signed data package may be provided to the server in order to generate a certificate for the endpoint device. The certificate may be usable by entities to establish trust with the endpoint device. A second entity may have access to the certificate and may provide a trust challenge to the endpoint device to establish a level of trust with the endpoint device.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: VINODKUMAR VASUDEV OTTAR, RAJARAVI CHANDRA KOLLARAPU, ABEYE TESHOME, BASSEM EL-AZZAMI, ADOLFO SANDOR MONTERO, MOHIT ARORA, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES
  • Publication number: 20250244986
    Abstract: Methods and systems for updating a data processing system are disclosed. To update the data processing system, an out of band communication channel may be used by a management controller of the data processing system to: obtain a command, and based on the command, obtain an update package from a remote entity for updating the data processing system. The management controller may store the update package in a partition using local side band communication channels. After the update package is stored, the management controller may initiate a restart of the data processing system. During the restart, if the update package is determined to be in the partition, a startup management entity may use the update package to update operation of a component to obtain an updated component. After completion of the restart, the updated component may be used to provide desired computer implemented services.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ADOLFO SANDOR MONTERO, RICHARD M. TONRY, ABEYE TESHOME, LUIS ANTONIO VALENCIA REYES, BASSEM EL-AZZAMI, MOHIT ARORA
  • Publication number: 20250247307
    Abstract: Methods and systems for managing a data processing system are disclosed. A management controller of the data processing system may provide behavior data for the data processing system to a service system via an out-of-band communication channel. The behavior data may indicate activity of the data processing system ascribed to a user of the data processing system. The management controller may obtain a response from the service system (via the out-of-band communication channel) that indicates whether the activity is expected for the user. If the activity is unexpected for the user, then the activity may indicate undesired use of the data processing system. Therefore, the management controller may initiate performance of an action set that is based on the behavior data in order to manage an impact of the undesired use of the data processing system.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: RICHARD M. TONRY, ABEYE TESHOME, MOHIT ARORA, BASSEM EL-AZZAMI, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, ADOLFO SANDOR MONTERO, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250245306
    Abstract: Methods and systems for managing data processing systems are disclosed. The data processing systems may operate in a secure environment (e.g., one that prevents hardware resources of the data processing systems from establishing an operable connection to remote devices), and may be managed by verifying the integrity of the data processing systems. The integrity may be verified as a prerequisite to use of the data processing systems. The integrity may be verified, at least in part, by verifying that the hardware component loadout of a data processing system is as expected. If the actual hardware component loadout diverges from an expected hardware component loadout, then remedial activity may be performed to manage an impact of component loadout differences.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: RAJARAVI CHANDRA KOLLARAPU, RICHARD M. TONRY, ABEYE TESHOME, BASSEM EL-AZZAMI, MOHIT ARORA, LUIS ANTONIO VALENCIA REYES, ADOLFO SANDOR MONTERO, VINODKUMAR VASUDEV OTTAR, AMY CHRISTINE NELSON
  • Publication number: 20250247670
    Abstract: Methods and systems for managing operations of data processing system are disclosed. To manage operations of the data processing system, a management controller of the data processing system may obtain and provide validated location data in the form of a location report for the data processing system to an external device via an out-of-band communication channel. The validated location data may be used to verify whether the data processing system is following expected geographical routes. By identifying any inconsistencies between the validated location data and expected geographical locations, the likelihood of identifying potential unauthorized modifications or other forms of compromise of the data processing system may be increased.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: ADOLFO SANDOR MONTERO, MOHIT ARORA, BASSEM EL-AZZAMI, RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ABEYE TESHOME, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES
  • Publication number: 20250247703
    Abstract: Methods and systems for managing a data processing system are disclosed. To manage the data processing system, a management controller of the data processing system may obtain location data for the data processing system via an out-of-band communication channel. The location data for the data processing system may include different types of location data obtained via different location generation sources. The management controller may identify whether the different types of location data are consistently reporting location status of the data processing system. If the location data is determined to be consistent, then the management controller may provide a location report based on the location data using the out-of-band communication channel to a server to update a location status of the data processing system.
    Type: Application
    Filed: January 29, 2024
    Publication date: July 31, 2025
    Inventors: BASSEM EL-AZZAMI, ABEYE TESHOME, RICHARD M. TONRY, MOHIT ARORA, ADOLFO SANDOR MONTERO, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250246519
    Abstract: Disclosed herein are a dual-sided bridge die, an integrated circuit die package assembly having the dual-sided bridge die, and a method for fabricating the integrated circuit die package assembly. A dual-sided bridge die includes a substrate; a first redistribution layer built on a top surface of the substrate and configured to couple with a bottom surface of a first integrated circuit die; and a second redistribution layer built on a bottom surface of the substrate and configured to couple with a top surface of a second integrated circuit die. The top surface and the bottom surface of the substrate are respectively disposed on opposite sides of the substrate.
    Type: Application
    Filed: January 26, 2024
    Publication date: July 31, 2025
    Inventors: Arsalan ALAM, Chandra Sekhar MANDALAPU, Liwei WANG, Manish DUBEY, Omkar Deepak GUPTE, Sri Ranga Sai BOYAPATI, Sai VADLAMANI