Patents by Inventor Depti Patel
Depti Patel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9869996Abstract: An Internet of things (IoT) network for managing assembly of a multi-part product in a production environment. A user wears a device that provides a hands-free display of assembly instructions while the user is assembling the product. The user also wears sensors for transmitting data about the user's location within the production environment. Point of assembly sensors are disposed at locations within the production environment for transmitting data regarding where the product is and should be assembled. The product's parts also include sensors that transmit data regarding location of the parts and how they are assembled. A backend computer system stores product assembly information including the assembly instructions, where the user should be to assemble the product, how the product should be assembled, and verification of assembly accuracy. Alerts are generated if information from the sensors does not corresponding with the preprogrammed information in the computer system.Type: GrantFiled: January 8, 2015Date of Patent: January 16, 2018Assignee: THE BOEING COMPANYInventors: Depti Patel, Robert J. Rencher, Luis A. Vinuelas, Roland N. Freeman, David W. Nelson
-
Publication number: 20160202692Abstract: An Internet of things (IoT) network for managing assembly of a multi-part product in a production environment. A user wears a device that provides a hands-free display of assembly instructions while the user is assembling the product. The user also wears sensors for transmitting data about the user's location within the production environment. Point of assembly sensors are disposed at locations within the production environment for transmitting data regarding where the product is and should be assembled. The product's parts also include sensors that transmit data regarding location of the parts and how they are assembled. A backend computer system stores product assembly information including the assembly instructions, where the user should be to assemble the product, how the product should be assembled, and verification of assembly accuracy. Alerts are generated if information from the sensors does not corresponding with the preprogrammed information in the computer system.Type: ApplicationFiled: January 8, 2015Publication date: July 14, 2016Inventors: Depti Patel, Robert J. Rencher, Luis A. Vinuelas, Roland N. Freeman, David W. Nelson
-
Publication number: 20160021486Abstract: A system and method for close proximity vehicular data transmission may include detecting, by a processor onboard a vehicle, a predetermined condition for activating a short range radio frequency (RF) transceiver onboard the vehicle. The onboard short range RF transceiver is configured to transmit and receive signals within a limited distance from the onboard short range RF transceiver. The onboard short range RF transceiver is activated in response to at least detecting the predetermined condition. A communications link is established between the onboard short range RF transceiver and a predetermined mobile communications device assigned to a particular crew member. Vehicular data is transmitted from the onboard short range RF transceiver to the predetermined mobile communications device.Type: ApplicationFiled: July 18, 2014Publication date: January 21, 2016Inventors: Robert John Rencher, Alimuddin Mohammad, Daniel D. McIntyre, Depti Patel
-
Patent number: 9232345Abstract: A system and method for close proximity vehicular data transmission may include detecting, by a processor onboard a vehicle, a predetermined condition for activating a short range radio frequency (RF) transceiver onboard the vehicle. The onboard short range RF transceiver is configured to transmit and receive signals within a limited distance from the onboard short range RF transceiver. The onboard short range RF transceiver is activated in response to at least detecting the predetermined condition. A communications link is established between the onboard short range RF transceiver and a predetermined mobile communications device assigned to a particular crew member. Vehicular data is transmitted from the onboard short range RF transceiver to the predetermined mobile communications device.Type: GrantFiled: July 18, 2014Date of Patent: January 5, 2016Assignee: The Boeing CompanyInventors: Robert John Rencher, Alimuddin Mohammad, Daniel D. McIntyre, Depti Patel
-
Patent number: 8903784Abstract: Systems, methods, and computer program products manage retention of data associated with a business record are described herein. In one embodiment, a computer-based system to manage retention of data associated with a business record comprises at least one processor and logic instructions stored in a tangible computer readable medium which, when executed by the at least one processor, configure the at least one processor to determine whether the business record has reached a record retention threshold, and in response to a determination that a business record has reached the record retention threshold to separate a business record into a plurality of data elements, wherein the data elements have at least one defined retention policy associated therewith, determine a selected storage location for each of the plurality of data elements based on the at least one defined retention policy and store each of the plurality of data elements in the selected storage location.Type: GrantFiled: August 24, 2012Date of Patent: December 2, 2014Assignee: The Boeing CompanyInventors: Roland N. Freeman, Depti Patel, Luis A. Vinuelas
-
Patent number: 8826429Abstract: A system and method for information security management. An anomaly in data traffic directed to a data processing environment is identified. The anomaly indicates a threat to the data processing environment. The data processing environment comprises a number of data processing systems. A threatened data processing system is identified. The threatened data processing system is one of the number of data processing systems to which the threat is directed. The threatened data processing system is isolated. The threatened data processing system is monitored after the threatened data processing system is isolated. The threatened data processing system is replicated to form a replicated data processing system.Type: GrantFiled: August 10, 2012Date of Patent: September 2, 2014Assignee: The Boeing CompanyInventors: Roland N. Freeman, Depti Patel, Luis Alfonso Vinuelas, Robert John Rencher, Faye Francy
-
Patent number: 8726348Abstract: A cloud computing security system. An access manager module includes first and second client profiles. The first client profile has a first set of rules enabling access to a first set of cloud computing system resources, and the second client profile has a second set of rules enabling access to a second set of cloud computing system resources. A security logic module is in communication with the access manager module. The security logic module is configured to receive an access request for access to one of the first and second sets of cloud computing system resources. Responsive to determining that the access request complies with at least one of the first set of rules and the second set of rules, the security logic module is configured to provide an access grant that grants access to at least one of the first and second sets of cloud computing system resources.Type: GrantFiled: December 15, 2010Date of Patent: May 13, 2014Assignee: The Boeing CompanyInventors: Depti Patel, Robert John Rencher, James M. Rubert, David Wayne Nelson
-
Publication number: 20140059023Abstract: Systems, methods, and computer program products manage retention of data associated with a business record are described herein. In one embodiment, a computer-based system to manage retention of data associated with a business record comprises at least one processor and logic instructions stored in a tangible computer readable medium which, when executed by the at least one processor, configure the at least one processor to determine whether the business record has reached a record retention threshold, and in response to a determination that a business record has reached the record retention threshold to separate a business record into a plurality of data elements, wherein the data elements have at least one defined retention policy associated therewith, determine a selected storage location for each of the plurality of data elements based on the at least one defined retention policy and store each of the plurality of data elements in the selected storage location.Type: ApplicationFiled: August 24, 2012Publication date: February 27, 2014Inventors: Roland N. Freeman, Depti Patel, Luis A. Vinuelas
-
Publication number: 20130263258Abstract: A system and method for information security management. An anomaly in data traffic directed to a data processing environment is identified. The anomaly indicates a threat to the data processing environment. The data processing environment comprises a number of data processing systems. A threatened data processing system is identified. The threatened data processing system is one of the number of data processing systems to which the threat is directed. The threatened data processing system is isolated. The threatened data processing system is monitored after the threatened data processing system is isolated. The threatened data processing system is replicated to form a replicated data processing system.Type: ApplicationFiled: August 10, 2012Publication date: October 3, 2013Applicant: THE BOEING COMPANYInventors: Roland N. Freeman, Depti Patel, Luis Alfonso Vinuelas, Robert John Rencher, Faye Francy
-
Publication number: 20120159572Abstract: A cloud computing security system. An access manager module includes first and second client profiles. The first client profile has a first set of rules enabling access to a first set of cloud computing system resources, and the second client profile has a second set of rules enabling access to a second set of cloud computing system resources. A security logic module is in communication with the access manager module. The security logic module is configured to receive an access request for access to one of the first and second sets of cloud computing system resources. Responsive to determining that the access request complies with at least one of the first set of rules and the second set of rules, the security logic module is configured to provide an access grant that grants access to at least one of the first and second sets of cloud computing system resources.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: THE BOEING COMPANYInventors: Depti Patel, Robert John Rencher, James M. Rubert, David Wayne Nelson