Patents by Inventor Dharmesh M. Patel

Dharmesh M. Patel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12293219
    Abstract: Techniques described herein relate to a method for managing a computer vision environment. The method includes identifying, by a computer vision (CV) node of a plurality of CV nodes, a CV alert; in response to identifying the CV alert: identifying candidate CV nodes of the plurality of CV nodes; generating a dynamic CV zone using the candidate CV nodes; initiating performance of a CV workload by the dynamic CV zone to generate CV data associated with the CV alert; generating a CV alert case associated with the CV alert; obtaining CV data from the dynamic CV zone; updating the CV alert case using the CV data generated during the performance of the CV workload; and providing the updated CV alert case to a VMS.
    Type: Grant
    Filed: January 21, 2022
    Date of Patent: May 6, 2025
    Assignee: Dell Products L.P.
    Inventors: Ian Roche, Philip Hummel, Dharmesh M. Patel
  • Patent number: 12293566
    Abstract: A system in accordance with one or more embodiments comprises a processor, a processing system operatively connected to the processor, and an enhanced networking interface operatively connected to the processing system. The enhanced networking interface is programmed to obtain encoded data from a local data source, perform a decoding of the encoded data to obtain decoded data, provide the decoded data to the processing system. The processing system is programmed to obtain the decoded data from the enhanced networking interface, perform a computer vision (CV) inferencing on the decoded data to obtain inferencing data, provide the inferencing data to the processor, and perform, by the processor, a remediation action based on the inferencing data.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: May 6, 2025
    Assignee: DELL PRODUCTS L.P.
    Inventors: Ian Roche, Philip Hummel, Dharmesh M. Patel
  • Patent number: 12282489
    Abstract: Methods and systems for managing and use of data are disclosed. To manage data, the data may be classified with respect to topics that are relevant to a user of a data storage system. The topics that are relevant to the user may be identified based on digital recordings of conversations between the user and other persons. Over time, the topics that are relevant to the user may change. The changes in relevant topics may be used to identify occurrences of different events in the user's life. These life events and data classified for corresponding topics may be used to service information request by providing context for the data and a means of discriminating more relevant from less relevant data.
    Type: Grant
    Filed: August 30, 2023
    Date of Patent: April 22, 2025
    Assignee: Dell Products L.P.
    Inventors: Prem Pradeep Motgi, Dharmesh M. Patel, Manpreet Singh Sokhi
  • Patent number: 12277426
    Abstract: Methods, systems, and devices for providing computer implemented services using managed systems are disclosed. To provide the computer implemented services, hardware components may be bundled into hardware bundles. The hardware bundles may be used to satisfy subscriptions for the services, and limit use of the hardware bundles when subscription limits are reached. The hardware bundles may include direct management hardware components and indirect management hardware components. The performance of the hardware bundles may be characterized to facilitate future selection for use of the hardware bundles in various processes.
    Type: Grant
    Filed: August 25, 2023
    Date of Patent: April 15, 2025
    Assignee: Dell Products L.P.
    Inventors: Lucas A. Wilson, Dharmesh M. Patel
  • Publication number: 20250112823
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices. The management controllers may store plans for addressing network disruptions. The plans may be used when communications with management systems are unavailable.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250112943
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices. If a plane is suspected of being compromised, the management controllers may take action to confirm the suspicions. If confirmed, then remedial activity may be initiated to address the compromised plane.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250112836
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices. If a plane is suspected of being compromised, the management controllers may take action to confirm the suspicions. If confirmed, then remedial activity may be initiated to address the compromised plane. The remedial activity may include use of falsified network condition reports to initiate programming of the data plane.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250112838
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices. If a plane is suspected of being compromised, the management controllers may take action to confirm the suspicions. If confirmed, then remedial activity may be initiated to address the compromised control plane.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250112937
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices. If a plane is suspected of being compromised, the management controllers may take action to confirm the suspicions. Test may be performed, and measurements may be taken to confirm whether a plane is compromised. If confirmed, then remedial activity may be initiated to address the compromised plane.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250112942
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices. If a plane is suspected of being compromised, the management controllers may take action to confirm the suspicions. If confirmed, then remedial activity may be initiated to address the compromised plane.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250112951
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices. If a plane is suspected of being compromised, the management controllers may take action to confirm the suspicions. If confirmed, then remedial activity may be initiated to address the compromised control plane. The remedial activity may include invocation of security functions of other network devices.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250112822
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices. If a plane is suspected of being compromised, the management controllers may take action to confirm the suspicions. If confirmed, then remedial activity may be initiated to address the compromised control plane. The remedial activity may be selected based on levels of impact on different services that utilize the network devices.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250112837
    Abstract: Methods and systems for managing the operation of a deployment are provided. The deployment may be managed in accordance with a subscription model. The subscription model may use subscriptions to define the extent and limits on use of services provided by the deployment. The subscription services and limits may be enforced by management controllers of network devices of the deployment. The management controllers may operate independently from control planes and data planes of the network devices.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: DHARMESH M. PATEL, JOHN A. LOCKMAN, III
  • Publication number: 20250077531
    Abstract: Methods and systems for managing data stored in a data management system by processing search queries are disclosed. To manage data, data management system may classify the data based on relevancy of the data for one or more purposes with respect to an individual. To identify relevant data, data management system may analyze data, including audio recordings of interactions between the individual for which the data is regarding and other individuals that provide services to the individual and identify topics of the data. Based on the analysis of the data and identified topics, data management system may establish a ranking order of the topics that are more relevant to the individual.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 6, 2025
    Inventors: PREM PRADEEP MOTGI, DHARMESH M. PATEL, MANPREET SINGH SOKHI
  • Publication number: 20250077575
    Abstract: Methods and systems for managing user interactions between a user and at least one user device are disclosed. To manage user interactions, data management system may obtain an interaction model to deploy to the at least one user device in order to establish an interface. The interaction model may define how the at least one user device communicates information to the user and/or obtained user input from the user. To obtain the interaction model relevant to a user, data management system may identify at least one condition impacting an ability of the user to interact with the at least one user device and the extent of the condition limiting the user's ability to interact with the at least one user device.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 6, 2025
    Inventors: PREM PRADEEP MOTGI, DHARMESH M. PATEL, MANPREET SINGH SOKHI
  • Publication number: 20250077574
    Abstract: Methods and systems for managing storage of data in a set of storage tiers are disclosed. To manage storage of data, data management system may analyze data to identify topic classifications and topic rankings for the data. Data management system may prioritize storage of data in higher performing storage tiers based on the relevancy of the data for one or more purposes with respect to an individual. To identify relevant data with respect to the individual for which data is being stored, data management system may analyze data, including audio recordings of interactions between the individual and other individuals to identify topics relevant to the individual. Based on the identified topics, data management system may establish a relevancy quantification for the portions of data and use the relevancy quantification to select a storage tier in which to store the portion of the data.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 6, 2025
    Inventors: PREM PRADEEP MOTGI, DHARMESH M. PATEL, MANPREET SINGH SOKHI
  • Publication number: 20250077694
    Abstract: Methods and systems for managing requests for functionalities of a data repository are disclosed. The data repository may store sensitive data (e.g., personal data), and may offer functionality (e.g., data access) in order to facilitate computer-implemented services. To prevent unauthorized access to and/or use of the sensitive data, an access control system may be implemented. For example, in order to gain access to data stored in the data repository, the access control system may prompt a requesting user to provide responses to security questions during authentication. The security questions may be based on details of personal experiences of the authorized user (e.g., identified from the personal data of the authorized user) and may be updated automatically when new data is introduced to the data repository. Therefore, the responses to the security questions required for authentication may be memorable to the authorized user and/or difficult to predict for unauthorized users.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 6, 2025
    Inventors: PREM PRADEEP MOTGI, DHARMESH M. PATEL, MANPREET SINGH SOKHI
  • Publication number: 20250077535
    Abstract: Methods and systems for managing and use of data are disclosed. To manage data, the data may be classified with respect to topics that are relevant to a user of a data storage system. The topics that are relevant to the user may be identified based on digital recordings of conversations between the user and other persons. Over time, the topics that are relevant to the user may change. The changes in relevant topics may be used to identify occurrences of different events in the user's life. These life events and data classified for corresponding topics may be used to service information request by providing context for the data and a means of discriminating more relevant from less relevant data.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 6, 2025
    Inventors: PREM PRADEEP MOTGI, DHARMESH M. PATEL, MANPREET SINGH SOKHI
  • Publication number: 20250077698
    Abstract: Methods and systems for managing access to data in a data management system are disclosed. To manage access to data, data management system may limit the access to data stored within the data management system based on an identity of a requestor from which a request for a portion of the data is obtained. Data management system may identify an access control model usable to manage access to the data stored in the data management system based on topics associated with the identity of the requestor and relevancy of each topic. To identify an access control model, data management system may use the identity of the requestor to identify associated topics and topic rankings for the identified topics. Based on the identified access control model, data management may provide a response to the requestor to service the request for a portion of data.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 6, 2025
    Inventors: PREM PRADEEP MOTGI, DHARMESH M. PATEL, MANPREET SINGH SOKHI
  • Publication number: 20250077530
    Abstract: Methods and systems for managing collection of data by a data management system and from data sources are disclosed. To manage collection of data, data management system may limit the types and quantity of data collected for storage in the data management system. Data management system may prioritize collection of data based on relevancy of the data for one or more purposes with respect to an individual. To identify relevant data, data management system may analyze data, including audio recordings of interactions between the individual for which the data is regarding and other individuals that provide services to the individual, and identify topics of the data. Based on the analysis of the data and identified topics, data management system may establish a ranking order of the topics that are more relevant to the individual.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 6, 2025
    Inventors: PREM PRADEEP MOTGI, DHARMESH M. PATEL, MANPREET SINGH SOKHI