Patents by Inventor Chandrakanth Are
Chandrakanth Are has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250087341Abstract: A system and methods for multimodal patient management in a healthcare facility are disclosed. The method can include determining that a patient is within a threshold distance of a healthcare facility based on geolocation data for a wearable device associated with the patient, automatically checking-in the patient for an appointment; transmitting, to the wearable device, a notification indicating: i) that the patient ready to be seen the healthcare provider for the scheduled appointment, and ii) a target area in the healthcare facility to which the patient is to navigate for the scheduled appointment; continuously tracking a position of the patient within the healthcare facility using the wearable device, in part to determine when the patient has exited the healthcare facility; and updating a status of the patient in a digital patient tracker based on the tracked position of the patient within the healthcare facility.Type: ApplicationFiled: September 13, 2023Publication date: March 13, 2025Inventors: Brandon Matthew Brown, Srilekha Akula, Stephen Ford Chambers, Timothy Meindle, Chandrakanth Reddy Mamillapalli, Andras Ferenczi
-
Publication number: 20250038958Abstract: Aspects of the disclosure generate independent encryption keys for objects (e.g., virtual machine disks (VMDKs)) without requiring the management of multiple keys. An encryption manager obtains a primary encryption key, an object identifier (ID) comprising a globally unique ID (GUID) for an object, a data salt comprising the object ID and a data salt string, and a metadata salt comprising the object ID and a metadata salt string. A data encryption key is generated using the primary encryption key, the data salt, and a one-way function. A metadata encryption key is generated using the primary encryption key, the metadata salt, and the one-way function. Because the data salt string and metadata salt string differ, the data encryption and metadata encryption keys differ. Object IDs for different objects differ, so each object and its metadata have globally unique keys. Key generation (other than the primary key) is deterministic, simplifying key management.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Abhay Kumar JAIN, Long YANG, Wenguang WANG, Chandrakanth GADHIRAJU
-
Publication number: 20250036526Abstract: Methods, systems, and devices for command and data path error protection are described. In some examples, a memory system may receive data units from a host device. The data units may include respective sets of parity bits, and the memory system may perform an error detection operation on the data units. A first controller of the memory system may generate a protocol unit using data (e.g., a subset of data) from the data units. The protocol unit may include a set of parity bits (e.g., a different set of parity bits), and a second controller of the memory system may perform an error detection operation on the protocol unit. The second controller of the memory system may generate a data storage unit using data (e.g., a subset of data) from the protocol unit, and may store the data unit and another set of parity bits to a memory device.Type: ApplicationFiled: August 1, 2024Publication date: January 30, 2025Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20250021271Abstract: Methods, systems, and devices for command timer interrupt are described. In some cases, a memory system having a host-driven logical block interface may maintain a timer to measure processing of commands. For example, upon receiving a command and storing the command in a command queue, a protocol controller of the memory system may issue the command to a command controller of the memory system and initiate the timer. Upon receiving a response for the command from the command controller, the protocol controller may reset or stop the timer, depending on whether the command queue is empty. If the timer expires prior to receiving a response for the command, the protocol controller may issue an interrupt signal to the command controller.Type: ApplicationFiled: July 24, 2024Publication date: January 16, 2025Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20240396571Abstract: Methods, systems, and devices for error protection for managed memory devices are described. In some examples, a memory system may receive data units from a host device. The data units may include respective sets of parity bits, and the memory system may perform an error detection operation on the data units. A first controller of the memory system may generate a protocol unit using data (e.g., a subset of data) from the data units. The protocol unit may include a set of parity bits (e.g., a different set of parity bits), and a second controller of the memory system may perform an error detection operation on the protocol unit. The second controller of the memory system may generate a data storage unit using data (e.g., a subset of data) from the protocol unit, and may store the data unit and another set of parity bits to a memory device.Type: ApplicationFiled: May 23, 2024Publication date: November 28, 2024Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20240354919Abstract: Systems and methods herein describe a metadata verification system that is configured to access a digital satellite image, generate a first discrete Fourier transform (DFT) pattern based on an ortho-rectified digital satellite image, generate a second DFT pattern based on rational polynomial coefficient (RPC) data of the digital satellite image, compare the first DFT pattern to the second DFT pattern, generate a score based on the comparison, and generate a determination of whether the digital satellite image has been manipulated based on the score.Type: ApplicationFiled: October 31, 2023Publication date: October 24, 2024Inventors: Chandrakanth Gudavalli, Michael Gene Goebel, Tejaswi Nanjundaswamy, Lakshmanan Nataraj, Shivkumar Chandrasekaran, Bangalore S. Manjunath
-
Publication number: 20240300392Abstract: A seat trim attachment system may have a seat adjuster that has an upper, intermediate, and lower portion. The seat adjuster may be connected to a seat base to assist with the movement of a lower seat cushion. A trim adjuster made up of one layer of an elastic material may be connected to an end of a seat trim. A trim flange with apertures may extend along the lower portion and be used as a retainer. A trim compensator made up of a connector portion, transition portion, and first and second side portions may be used to keep the trim taut.Type: ApplicationFiled: March 6, 2024Publication date: September 12, 2024Applicant: Adient US LLCInventors: Ryan FERONI, Chandrakanth KUNDARGI, Manoj SABALE, Mauricio ESPINOSA
-
Patent number: 12073121Abstract: Methods, systems, and devices for command timer interrupt are described. In some cases, a memory system having a host-driven logical block interface may maintain a timer to measure processing of commands. For example, upon receiving a command and storing the command in a command queue, a protocol controller of the memory system may issue the command to a command controller of the memory system and initiate the timer. Upon receiving a response for the command from the command controller, the protocol controller may reset or stop the timer, depending on whether the command queue is empty. If the timer expires prior to receiving a response for the command, the protocol controller may issue an interrupt signal to the command controller.Type: GrantFiled: October 20, 2022Date of Patent: August 27, 2024Assignee: Micron Technology, Inc.Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Patent number: 12073663Abstract: A vehicle may receive a request for use of a vehicle resource from a remote source. The vehicle may determine if the vehicle is capable of fulfilling the request based a state of the resource. The may also determine and send a cost for using the resource, to the remote source, in response to determining the vehicle is capable of fulfilling the request and provide use of the resource in accordance with a use-term defined in conjunction with the cost, in response to receiving agreement from the remote source to pay the cost.Type: GrantFiled: May 17, 2022Date of Patent: August 27, 2024Assignee: Ford Global Technologies, LLCInventors: Jeffrey Brian Yeung, Ayush Chandrakanth Shah, Sandeep Sasidharan, Perry Robinson MacNeille
-
Patent number: 12072764Abstract: Methods, systems, and devices for command and data path error protection are described. In some examples, a memory system may receive data units from a host device. The data units may include respective sets of parity bits, and the memory system may perform an error detection operation on the data units. A first controller of the memory system may generate a protocol unit using data (e.g., a subset of data) from the data units. The protocol unit may include a set of parity bits (e.g., a different set of parity bits), and a second controller of the memory system may perform an error detection operation on the protocol unit. The second controller of the memory system may generate a data storage unit using data (e.g., a subset of data) from the protocol unit, and may store the data unit and another set of parity bits to a memory device.Type: GrantFiled: October 20, 2022Date of Patent: August 27, 2024Assignee: Micron Technology, Inc.Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20240251211Abstract: A hearing instrument and the techniques of operating the hearing instrument to improve audio reception while lowering the risk of foreign material ingress. The hearing instrument includes a microphone, and a housing that defines a cavity containing the microphone. The housing includes a battery door defining a first portion of an audio channel, the first portion of the audio channel having a first entrance on an exterior surface of the battery door, the first portion of the audio channel having a first exit on an internal surface of the battery door. The housing further includes a housing element defining a second portion of the audio channel, the second portion of the audio channel having a second entrance aligned with the first exit, the second portion of the audio channel terminating in the cavity containing the microphone.Type: ApplicationFiled: January 22, 2024Publication date: July 25, 2024Inventors: Toan Huy Phan, Ganesh Borra, Chandrakanth Barad
-
Publication number: 20240231685Abstract: Methods, systems, and devices for command timer interrupt are described. In some cases, a memory system having a host-driven logical block interface may maintain a timer to measure processing of commands. For example, upon receiving a command and storing the command in a command queue, a protocol controller of the memory system may issue the command to a command controller of the memory system and initiate the timer. Upon receiving a response for the command from the command controller, the protocol controller may reset or stop the timer, depending on whether the command queue is empty. If the timer expires prior to receiving a response for the command, the protocol controller may issue an interrupt signal to the command controller.Type: ApplicationFiled: October 20, 2022Publication date: July 11, 2024Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20240235578Abstract: Methods, systems, and devices for error protection for managed memory devices are described. In some examples, a memory system may receive data units from a host device. The data units may include respective sets of parity bits, and the memory system may perform an error detection operation on the data units. A first controller of the memory system may generate a protocol unit using data (e.g., a subset of data) from the data units. The protocol unit may include a set of parity bits (e.g., a different set of parity bits), and a second controller of the memory system may perform an error detection operation on the protocol unit. The second controller of the memory system may generate a data storage unit using data (e.g., a subset of data) from the protocol unit, and may store the data unit and another set of parity bits to a memory device.Type: ApplicationFiled: October 20, 2022Publication date: July 11, 2024Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20240232014Abstract: Methods, systems, and devices for command and data path error protection are described. In some examples, a memory system may receive data units from a host device. The data units may include respective sets of parity bits, and the memory system may perform an error detection operation on the data units. A first controller of the memory system may generate a protocol unit using data (e.g., a subset of data) from the data units. The protocol unit may include a set of parity bits (e.g., a different set of parity bits), and a second controller of the memory system may perform an error detection operation on the protocol unit. The second controller of the memory system may generate a data storage unit using data (e.g., a subset of data) from the protocol unit, and may store the data unit and another set of parity bits to a memory device.Type: ApplicationFiled: October 20, 2022Publication date: July 11, 2024Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Patent number: 12021981Abstract: An example method for a first host, being an owner of an object stored in a virtual storage area network (vSAN) cluster, to perform encryption and decryption operations during a rekey in the vSAN cluster is disclosed. The method includes obtaining a first encryption key and a first key identifier (ID) of the first encryption key; transmitting the first key ID and an active key index to a second host; using the first encryption key to perform encryption and decryption operations; and in response to a determination of receiving a key change notification from a master node of the vSAN cluster, terminating a connection with the second host.Type: GrantFiled: March 2, 2022Date of Patent: June 25, 2024Assignee: VMware, Inc.Inventors: Wenguang Wang, Abhay Kuamr Jain, Ruiling Dou, Tao Xie, Xin Li, Chandrakanth Gadhiraju, Kevin Rayfeng Li, Satish Pudi
-
Patent number: 12001279Abstract: Methods, systems, and devices for error protection for managed memory devices are described. In some examples, a memory system may receive data units from a host device. The data units may include respective sets of parity bits, and the memory system may perform an error detection operation on the data units. A first controller of the memory system may generate a protocol unit using data (e.g., a subset of data) from the data units. The protocol unit may include a set of parity bits (e.g., a different set of parity bits), and a second controller of the memory system may perform an error detection operation on the protocol unit. The second controller of the memory system may generate a data storage unit using data (e.g., a subset of data) from the protocol unit, and may store the data unit and another set of parity bits to a memory device.Type: GrantFiled: October 20, 2022Date of Patent: June 4, 2024Assignee: Micron Technology, Inc.Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20240160526Abstract: Methods, systems, and devices for data recovery using ordered data requests are described. In some examples, a memory system may receive data units from a host device. A first controller of the memory system may generate a protocol unit using the data units. A second controller of the memory system may generate a data storage unit using data from the protocol unit, and may store the data unit to a memory device. The memory system may perform error detection operations using respective sets of parity bits for each of the units. Upon detecting an error, the memory system may, for a write operation, re-request data associated with error and regenerate the units to correct for the error, or, for a read operation, re-read data associated with the error and regenerate the units to correct for the error.Type: ApplicationFiled: January 19, 2024Publication date: May 16, 2024Inventors: Tal Sharifie, Chandrakanth Rapalli, Yoav Weinberg
-
Publication number: 20240134567Abstract: Methods, systems, and devices for command timer interrupt are described. In some cases, a memory system having a host-driven logical block interface may maintain a timer to measure processing of commands. For example, upon receiving a command and storing the command in a command queue, a protocol controller of the memory system may issue the command to a command controller of the memory system and initiate the timer. Upon receiving a response for the command from the command controller, the protocol controller may reset or stop the timer, depending on whether the command queue is empty. If the timer expires prior to receiving a response for the command, the protocol controller may issue an interrupt signal to the command controller.Type: ApplicationFiled: October 19, 2022Publication date: April 25, 2024Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20240134746Abstract: Methods, systems, and devices for command and data path error protection are described. In some examples, a memory system may receive data units from a host device. The data units may include respective sets of parity bits, and the memory system may perform an error detection operation on the data units. A first controller of the memory system may generate a protocol unit using data (e.g., a subset of data) from the data units. The protocol unit may include a set of parity bits (e.g., a different set of parity bits), and a second controller of the memory system may perform an error detection operation on the protocol unit. The second controller of the memory system may generate a data storage unit using data (e.g., a subset of data) from the protocol unit, and may store the data unit and another set of parity bits to a memory device.Type: ApplicationFiled: October 19, 2022Publication date: April 25, 2024Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie
-
Publication number: 20240134740Abstract: Methods, systems, and devices for error protection for managed memory devices are described. In some examples, a memory system may receive data units from a host device. The data units may include respective sets of parity bits, and the memory system may perform an error detection operation on the data units. A first controller of the memory system may generate a protocol unit using data (e.g., a subset of data) from the data units. The protocol unit may include a set of parity bits (e.g., a different set of parity bits), and a second controller of the memory system may perform an error detection operation on the protocol unit. The second controller of the memory system may generate a data storage unit using data (e.g., a subset of data) from the protocol unit, and may store the data unit and another set of parity bits to a memory device.Type: ApplicationFiled: October 19, 2022Publication date: April 25, 2024Inventors: Chandrakanth Rapalli, Yoav Weinberg, Tal Sharifie