Patents by Inventor Dattatraya Kulkarni
Dattatraya Kulkarni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250182439Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for unsupervised learning of object keypoint locations in images. In particular, a keypoint extraction machine learning model having a plurality of keypoint model parameters is trained to receive an input image and to process the input image in accordance with the keypoint model parameters to generate a plurality of keypoint locations in the input image. The machine learning model is trained using either temporal transport or spatio-temporal transport.Type: ApplicationFiled: November 12, 2024Publication date: June 5, 2025Inventors: Ankush Gupta, Tejas Dattatraya Kulkarni
-
Publication number: 20250169027Abstract: Systems, apparatus, articles of manufacture, and methods to enhance cooling of computing devices are disclosed. An example apparatus includes a blower housing, and an impeller carried by the blower housing. The impeller is to rotate to force air out through an outlet of the blower housing. The example apparatus further includes an ionic cooling system carried by the blower housing. The ionic cooling system is to force air out through the outlet of the blower housing.Type: ApplicationFiled: January 17, 2025Publication date: May 22, 2025Applicant: Intel CorporationInventors: Shantanu Dattatraya Kulkarni, James Raupp
-
Patent number: 12248602Abstract: Methods, apparatus, systems, and articles of manufacture for orchestrating personal protection across digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to monitor digital assets associated with a protection threat surface to detect a protection event, determine one or more protection vectors associated with the digital assets in response to detecting the protection event, the one or more protection vectors including one or more values corresponding to an impact of the protection event on an overall protection posture associated with the protection threat surface, and determine protection remediation action for the digital assets based on the one or more protection vectors.Type: GrantFiled: August 27, 2021Date of Patent: March 11, 2025Assignee: MCAFEE, LLCInventors: Srikanth Nalluri, Dattatraya Kulkarni, Raghavendra Hebbalalu, Sandeep Swastik, Piyush Pramod Joshi, Samrat Chitta, Partha Sarathi Barik
-
Patent number: 12216306Abstract: An illuminated display screen bezel may provide improved user illumination when using a portable electronic device. The illuminated display screen bezel may include a series of LEDs built into the bezel, may include a light guide plate, or may include an extended display area at least partially covered by a controllable opaque layer. These lighting mechanisms may be dynamically controlled and adjusted with one or more smart control algorithms to suit different users. The improved image quality may be used to provide improved performance of image processing features, such as improving the ability of a videoconferencing program to create a virtual background or improving the ability of an AI system to perform image analysis. These lighting configurations may also be used for providing notification lights, automatic dimming based on detected ambient light, program-enhancing RGB lighting effects, mood lighting, and other lighting effects.Type: GrantFiled: December 27, 2023Date of Patent: February 4, 2025Assignee: Intel CorporationInventors: Surya Pratap Mishra, Shantanu Dattatraya Kulkarni, Min Suet Lim
-
Publication number: 20250030685Abstract: Methods and apparatus for voice transformation, authentication, and metadata communication are disclosed.Type: ApplicationFiled: July 18, 2023Publication date: January 23, 2025Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Ayush Agarwal
-
Patent number: 12175723Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for unsupervised learning of object keypoint locations in images. In particular, a keypoint extraction machine learning model having a plurality of keypoint model parameters is trained to receive an input image and to process the input image in accordance with the keypoint model parameters to generate a plurality of keypoint locations in the input image. The machine learning model is trained using either temporal transport or spatio-temporal transport.Type: GrantFiled: May 5, 2020Date of Patent: December 24, 2024Assignee: DeepMind Technologies LimitedInventors: Ankush Gupta, Tejas Dattatraya Kulkarni
-
Patent number: 12141270Abstract: Methods, apparatus, systems, and articles of manufacture for comprehensive user-centric protection of digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to identify digital assets associated with a protection threat surface, detect protection events corresponding to threats associated with the digital assets, and determine protection vectors associated with the digital assets based on the protection events, the protection vectors corresponding to protection capabilities associated with the digital assets.Type: GrantFiled: August 27, 2021Date of Patent: November 12, 2024Assignee: McAfee, LLCInventors: Srikanth Nalluri, Dattatraya Kulkarni, Raghavendra Hebbalalu, Pravat Lall, Jitesh Dattani, Samrat Chitta
-
Patent number: 12141613Abstract: An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to monitor software and hardware parameters on an electronic device that includes an application designated as a preferred application; determine whether the preferred application is running; detect a change in software or hardware parameters that indicates to reallocate resources to the preferred application; and apply, based on detecting the change in software or hardware parameters, an optimization policy that reallocates resources to a process associated with the preferred application.Type: GrantFiled: March 30, 2021Date of Patent: November 12, 2024Assignee: McAfee, LLCInventors: Raghavendra Satyanarayana Hebbalalu, Raja Sinha, Dattatraya Kulkarni, Partha Sarathi Barik, Srikanth Nalluri, Siddaraya B. Revashetti
-
Publication number: 20240296074Abstract: There is disclosed in one example a computer apparatus, including: a hardware platform including a central processor unit (CPU) and a memory; and instructions encoded within the memory to instruct the CPU to: enumerate a plurality of running processes, and associate resource demands with the running processes; predict a resource starvation condition for at least one process; rank the plurality of running processes according to a dynamic ranking algorithm, wherein the ranking algorithm includes user engagement as an input for ranking a process; and according to the ranking and a safeguard algorithm, deallocate resources from a process ranked lower than the at least one process and assign the deallocated resources to the at least one process to mitigate the predicted resource starvation condition.Type: ApplicationFiled: April 22, 2024Publication date: September 5, 2024Inventors: Raghavendra Satyanarayana Hebbalalu, Dattatraya Kulkarni, Srikanth Nalluri, Partha Sarathi Barik, Raja Sinha, Anjan Kumar Nayak
-
Publication number: 20240283674Abstract: There is disclosed a computer-implemented system and method of detecting a device that deceptively misidentifies itself on a home network, including sending, to the device, discovery probes, and receiving in response to the discovery probes a self-reported identity; performing a verification of the self-reported identity, comprising over a time greater than one hour, monitoring network traffic from the device to determine whether network traffic over the time is consistent with expected network traffic for the self-reported identity; and upon determining that the network traffic is not consistent, designating the device as potentially deceptively misidentified, and acting to mitigate the device's activity.Type: ApplicationFiled: April 29, 2024Publication date: August 22, 2024Inventors: Tirumaleswar Reddy Konda, Abhishek Tripathi, Urmil Mahendra Parikh, Dattatraya Kulkarni
-
Publication number: 20240275813Abstract: There is disclosed in one example a computer-implemented system and method, including upon determining that an application has a non-benign reputation, selectively installing the application based on a user input; and personalizing the application by running the application concurrently with a personalization engine to limit the application to benign behavior.Type: ApplicationFiled: April 24, 2024Publication date: August 15, 2024Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Raja Sinha, Venkatasubrahmanyam Krishnapur
-
Patent number: 12057959Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; a network interface to communicatively couple to a network; and a network gateway engine to identify devices on the network, the network gateway engine including instructions encoded within the memory to instruct the processor to provide two-phase identification for a device newly-identified on the network, including: a static identification phase including applying discovery probes to the newly-identified device; and a dynamic identification phase including collecting network telemetry for the newly-identified device over time and analyzing the collected network telemetry to determine if the network telemetry is consistent with expected network usage for the newly-discovered device.Type: GrantFiled: December 31, 2019Date of Patent: August 6, 2024Assignee: McAfee, LLCInventors: Tirumaleswar Reddy Konda, Abhishek Tripathi, Urmil Mahendra Parikh, Dattatraya Kulkarni
-
Publication number: 20240207278Abstract: Liquid pharmaceutical compositions of tofacitinib or its pharmaceutically acceptable salts thereof are described, which are suitable for oral administration, and which are stable under varying storage conditions for extended periods of time. Methods of treating auto-immune disorders are also described, using the stable liquid pharmaceutical compositions of tofacitinib. A stable liquid pharmaceutical composition of tofacitinib according to the invention comprises of (a) tofacitinib at a concentration of about 1 mg/mL or more; (b) a pharmaceutically acceptable liquid vehicle; (c) at least one anti-oxidant; and (d) optionally one or more other pharmaceutically acceptable excipients.Type: ApplicationFiled: March 7, 2024Publication date: June 27, 2024Applicant: SLAYBACK PHARMA LLCInventors: Sushant Omprakash DUBE, Purushottam Dattatraya KULKARNI, Purushottam Sakhahari PATTEWAR, Sumitra Ashokkumar PILLAI
-
Patent number: 12021892Abstract: There is disclosed in one example a remediation server including: a hardware platform, including a processor, a memory, and a network interface; and instructions encoded within the memory to instruct the processor to: receive an application binary; create an application logic model of the application binary; and create personalization rules for the application binary based on the application logic model.Type: GrantFiled: April 12, 2019Date of Patent: June 25, 2024Assignee: McAfee, LLCInventors: Dattatraya Kulkarni, Srikanth Nalluri, Raja Sinha, Venkatasubrahmanyam Krishnapur
-
Patent number: 12001558Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety.Type: GrantFiled: April 26, 2021Date of Patent: June 4, 2024Assignee: MCAFEE, LLCInventors: Dattatraya Kulkarni, Himanshu Srivastava, Raj Vardhan, Raja Sinha, Srikanth Nalluri, Tirumaleswar Reddy Konda
-
Publication number: 20240143546Abstract: Disclosed examples include causing transmission of an indication to a server. The indication indicates that a file on a host storage location is designated as a favorite file. The indication causes a copy of the file to be stored in a favorites storage device. Disclosed examples also include generating a modified copy of the file by modifying the file at the host storage location, and causing synchronization of the modified copy of the file from the host storage location to replace the copy of the file at the favorites storage device.Type: ApplicationFiled: January 11, 2024Publication date: May 2, 2024Inventors: Kranthikumar Gadde, Mitesh Kumar, Kamlesh Halder, Raj Vardhan, Srikanth Nalluri, Dattatraya Kulkarni, Susmita Nayak, Krishnapur Venkatasubrahmanyam
-
Publication number: 20240137383Abstract: There is disclosed herein a computer-implemented system and method of providing wellness detect and response (WDR) security services for an enterprise, including computing, for the enterprise, a quantitative user-centric security posture, wherein computing the quantitative user-centric security posture comprises calculating, for a user, a quantitative user risk profile according to a combination of user role, user privileges, user behavior, and digital assets assigned to a user and owned by the enterprise.Type: ApplicationFiled: December 15, 2023Publication date: April 25, 2024Applicant: McAfee, LLCInventors: Dattatraya Kulkarni, Raghavendra Satyanarayana Hebbalalu, Srikanth Nalluri, Urmil Mahendra Parikh, Shashank Jain, Himanshu Srivastava, Piyush Pramod Joshi, Partha Sarathi Barik, Purushothaman Balamurugan, Saravana Kumar Ramalingam, Devanshi Saxena, Martin Pivetta, Sujay Subrahmanya, Shahmeet Singh, Ryan Burrows, Samrat Chitta
-
Patent number: 11966787Abstract: There is disclosed in one example a computer apparatus, including: a hardware platform including a central processor unit (CPU) and a memory; and instructions encoded within the memory to instruct the CPU to: enumerate a plurality of running processes, and associate resource demands with the running processes; predict a resource starvation condition for at least one process; rank the plurality of running processes according to a dynamic ranking algorithm, wherein the ranking algorithm includes user engagement as an input for ranking a process; and according to the ranking and a safeguard algorithm, deallocate resources from a process ranked lower than the at least one process and assign the deallocated resources to the at least one process to mitigate the predicted resource starvation condition.Type: GrantFiled: March 31, 2021Date of Patent: April 23, 2024Assignee: McAfee LLCInventors: Raghavendra Satyanarayana Hebbalalu, Dattatraya Kulkarni, Srikanth Nalluri, Partha Sarathi Barik, Raja Sinha, Anjan Kumar Nayak
-
Patent number: 11957685Abstract: Liquid pharmaceutical compositions of tofacitinib or its pharmaceutically acceptable salts thereof are described, which are suitable for oral administration, and which are stable under varying storage conditions for extended periods of time. Methods of treating auto-immune disorders are also described, using the stable liquid pharmaceutical compositions of tofacitinib. A stable liquid pharmaceutical composition of tofacitinib according to the invention comprises of (a) tofacitinib at a concentration of about 1 mg/mL or more; (b) a pharmaceutically acceptable liquid vehicle; (c) at least one anti-oxidant; and (d) optionally one or more other pharmaceutically acceptable excipients.Type: GrantFiled: August 10, 2023Date of Patent: April 16, 2024Assignee: SLAYBACK PHARMA LLCInventors: Sushant Omprakash Dube, Purushottam Dattatraya Kulkarni, Purushottam Sakhahari Pattewar, Sumitra Ashokkumar Pillai
-
Publication number: 20240114048Abstract: A computer-implemented method provides security services to an enterprise. The method computes, for a plurality of enterprise users, a plurality of user health scores based on respective protection statuses for a plurality of enterprise assets owned by respective users; computes, for the enterprise, an overall enterprise security status score based on the plurality of user health scores; graphically displays to an enterprise administrator the overall enterprise security status score; and presents to the enterprise administrator a plurality of action recommendations to improve the overall enterprise security status score.Type: ApplicationFiled: December 23, 2022Publication date: April 4, 2024Applicant: McAfee, LLCInventors: Dattatraya Kulkarni, Srikanth Nalluri, Himanshu Srivastava, Shashank Jain, Urmil Mahendra Parikh, Raghavendra Satyanarayana Hebbalalu, Piyush Pramod Joshi, Partha Sarathi Barik, Purushothaman Balamurugan, Saravana Kumar Ramalingam, Devanshi Saxena, Martin Pivetta, Sujay Subrahmanya, Shahmeet Singh, Ryan Burrows