Patents by Inventor Divya Gupta
Divya Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240127538Abstract: This document describes scene understanding for cross reality systems using occupancy grids. In one aspect, a method includes recognizing one or more objects in a model of a physical environment generated using images of the physical environment. For each object, a bounding box is fit around the object. An occupancy grid that includes a multiple cells is generated within the bounding box around the object. A value is assigned to each cell of the occupancy grid based on whether the cell includes a portion of the object. An object representation that includes information describing the occupancy grid for the object is generated. The object representations are sent to one or more devices.Type: ApplicationFiled: February 3, 2022Publication date: April 18, 2024Inventors: Divya Ramnath, Shiyu Dong, Siddharth Choudhary, Siddharth Mahendran, Arumugam Kalai Kannan, Prateek Singhal, Khushi Gupta
-
Publication number: 20240005712Abstract: It is provided a method for controlling access to a physical space secured by an electronic lock. The method is performed in an access evaluator and comprises: obtaining one or more input parameters relating to a user requesting access to the restricted physical space; evaluating a first access condition based on a credential presented by the user; evaluating a second access condition using a machine-learning model, based on the one or more input parameters; and unlocking the electronic lock when both the first access condition and the second access condition are evaluated to be true.Type: ApplicationFiled: November 10, 2021Publication date: January 4, 2024Inventors: Divya Gupta, Siddharth Gaur, Jeevan Kaur, Aravindan Varadan, Priya Jindal, Bhavay Satija
-
Publication number: 20230229594Abstract: A system detects a powerdown event, such as a power loss event, and performs a flush of volatile memory to persistent memory during a powerdown sequence. The system includes an energy backup device to power the system during the powerdown sequence. The system is configurable with optional settings that configure the powerdown sequence specific to a type of the energy backup device.Type: ApplicationFiled: December 31, 2022Publication date: July 20, 2023Inventors: Kai CHENG, Divya GUPTA, Nikethan Shivanand BALIGAR, Vivek GARG, Aurelio RODRIGUEZ ECHEVARRIA, Russell J. WUNDERLICH
-
Publication number: 20230032519Abstract: A secure inference over Deep Neural Networks (DNNs) using secure two-party computation to perform privacy-preserving machine learning. The secure inference uses a particular type of comparison that can be used as a building block for various layers in the DNN including, for example, ReLU activations and divisions. The comparison securely computes a Boolean share of a bit representing whether input value x is less than input value y, where x is held by a user of the DNN, and where y is held by a provider of the DNN. Each party computing system parses their input into leaf strings of multiple bits. This is much more efficient than if the leaf strings were individual bits. Accordingly, the secure inference described herein is more readily adapted for using in complex DNNs.Type: ApplicationFiled: October 30, 2020Publication date: February 2, 2023Inventors: Nishanth CHANDRAN, Divya GUPTA, Aseem RASTOGI, Rahul SHARMA, Nishant KUMAR, Mayank RATHEE, Deevashwer RATHEE
-
Publication number: 20220329581Abstract: Systems and methods for selectively authenticating an untrusted device based on a trust level are disclosed. The system can include transmitting an authentication request from a first device seeking to authenticate a second device to access to an account. The first device receives an authentication token that can be used by the second device for authentication. The authentication token can be transmitted wirelessly to the second device or can be scanned by the second device in the case that the token is a scannable image displayed on the first device. The systems can determine a trust level for the second device based on an association between the first device and the second device. The system can provide the second device a degree of access to the account that relates to the trust level.Type: ApplicationFiled: April 12, 2021Publication date: October 13, 2022Inventors: Zainab Zaki, Divya Gupta, Brian Choe
-
Patent number: 11405181Abstract: A system includes a set of low resource devices, each configured to receive transactions to be added to an encrypted block chain ledger from a sample of untrusted high resource devices, prepare a proposed block of the received transactions, provide the proposed block to the sample of untrusted high resource devices, receive proposed blocks from the untrusted high resource devices originating from the set of low resource devices. The low resource devices run a consensus protocol to select one proposed block to add to the encrypted block chain ledger stored on the untrusted high resource devices.Type: GrantFiled: July 12, 2019Date of Patent: August 2, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Apurv Mehra, Satyanarayana V. Lokam, Sambhav Satija, Sudheesh Singanamalla
-
Publication number: 20210294772Abstract: In one embodiment, an apparatus includes: a plurality of cores to execute instructions; a firmware agent to execute a first firmware; a Peripheral Component Interconnect Express (PCIe) interface to communicate with a device via a PCIe link; and a boot agent coupled to the PCIe interface to download the PCIe firmware from a non-volatile memory and provide the PCIe firmware to the PCIe interface. The PCIe interface may receive a PCIe firmware for the PCIe interface before the firmware agent is to receive the first firmware. Other embodiments are described and claimed.Type: ApplicationFiled: June 7, 2021Publication date: September 23, 2021Inventors: Amit Kumar Srivastava, Divya Gupta, Michael Karas, James Mitchell, Malay Trivedi, Chung-Chi Wang
-
Publication number: 20210014042Abstract: A system includes a set of low resource devices, each configured to receive transactions to be added to an encrypted block chain ledger from a sample of untrusted high resource devices, prepare a proposed block of the received transactions, provide the proposed block to the sample of untrusted high resource devices, receive proposed blocks from the untrusted high resource devices originating from the set of low resource devices. The low resource devices run a consensus protocol to select one proposed block to add to the encrypted block chain ledger stored on the untrusted high resource devices.Type: ApplicationFiled: July 12, 2019Publication date: January 14, 2021Inventors: Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Apurv Mehra, Satyanarayana V. Lokam, Sambhav Satija, Sudheesh Singanamalla
-
Patent number: 10671027Abstract: In embodiments, a system may comprise a circuit component to perform a function; and a supervisor component (e.g., a safety component) coupled to the circuit component to monitor proper functioning of the circuit component. The circuit component may be configured to initiate provision of diagnostic information to the supervisor component, or to indicate to the safety component whether the circuit component will be responsive to a query from the safety component for diagnostic information.Type: GrantFiled: June 20, 2018Date of Patent: June 2, 2020Assignee: Intel CorporationInventors: Gabriele Boschi, Alessandro Campinoti, Jennifer Wang, Divya Gupta
-
Patent number: 10460234Abstract: Systems and methods for private deep neural network training are disclosed. Method includes storing first private values at first machine and second private values at second machine; providing, to third machine, first share of first private values and first share of second private values; providing, to fourth machine, second share of first private values and second share of second private values; computing, at third machine, third machine-value based on first share of first private values and first share of second private values; computing, at fourth machine, fourth machine-value based on second share of first private values and second share of second private values; providing, to first machine and second machine, third machine-value and fourth machine-value; and computing, at first machine, a mathematical function of first private values and second private values, mathematical function being computed based on first private values stored at first machine, third machine-value, and fourth machine-value.Type: GrantFiled: March 9, 2018Date of Patent: October 29, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Nishanth Chandran, Divya Gupta, Sameer Wagh
-
Patent number: 10417119Abstract: A method for automated software testing may include mapping test cases to lines in files in a codebase. Each test case covers one or more lines in one or more files and has corresponding test results. The method may further include obtaining a change list including one or more changes. Each change specifies a changed line in a changed file. The method may further include determining impacted test cases, based on the mapping and the change list, prioritizing the impacted test cases based, in part, on test results corresponding to each impacted test case, executing, based on the prioritization, one or more impacted test cases to obtain executed test cases, and obtaining, for each executed test case, new test results.Type: GrantFiled: April 28, 2016Date of Patent: September 17, 2019Assignee: INTUIT INC.Inventors: Sachin Francis, Divya Gupta, Ayush Datta, Vijay Thomas
-
Publication number: 20190228299Abstract: Systems and methods for private deep neural network training are disclosed. Method includes storing first private values at first machine and second private values at second machine; providing, to third machine, first share of first private values and first share of second private values; providing, to fourth machine, second share of first private values and second share of second private values; computing, at third machine, third machine-value based on first share of first private values and first share of second private values; computing, at fourth machine, fourth machine-value based on second share of first private values and second share of second private values; providing, to first machine and second machine, third machine-value and fourth machine-value; and computing, at first machine, a mathematical function of first private values and second private values, mathematical function being computed based on first private values stored at first machine, third machine-value, and fourth machine-value.Type: ApplicationFiled: March 9, 2018Publication date: July 25, 2019Inventors: Nishanth Chandran, Divya Gupta, Sameer Wagh
-
Publication number: 20190049905Abstract: In embodiments, a system may comprise a circuit component to perform a function; and a supervisor component (e.g., a safety component) coupled to the circuit component to monitor proper functioning of the circuit component. The circuit component may be configured to initiate provision of diagnostic information to the supervisor component, or to indicate to the safety component whether the circuit component will be responsive to a query from the safety component for diagnostic information.Type: ApplicationFiled: June 20, 2018Publication date: February 14, 2019Inventors: Gabriele Boschi, Alessandro Campinoti, Jennifer Wang, Divya Gupta
-
Publication number: 20170262361Abstract: A method for automated software testing may include mapping test cases to lines in files in a codebase. Each test case covers one or more lines in one or more files and has corresponding test results. The method may further include obtaining a change list including one or more changes. Each change specifies a changed line in a changed file. The method may further include determining impacted test cases, based on the mapping and the change list, prioritizing the impacted test cases based, in part, on test results corresponding to each impacted test case, executing, based on the prioritization, one or more impacted test cases to obtain executed test cases, and obtaining, for each executed test case, new test results.Type: ApplicationFiled: April 28, 2016Publication date: September 14, 2017Applicant: Intuit Inc.Inventors: Sachin Francis, Divya Gupta, Ayush Datta, Vijay Thomas
-
Patent number: 7460531Abstract: Provided are a method, system, and program for constructing a packet. A request to construct one packet is received, including information on at least one header and a payload to include in the packet. The at least one header for the received request is generated and the generated at least one header is written in a first queue. The payload is requested to include in the packet and the received payload is written to a second queue. The generated at least one header and payload are read from the first and second queues and the read at least one header and payload are included in the packet.Type: GrantFiled: October 27, 2003Date of Patent: December 2, 2008Assignee: Intel CorporationInventors: Divya Gupta, Hassan Fallah-Adl, Salil Phadnis
-
Publication number: 20050089033Abstract: Provided are a method, system, and program for constructing a packet. A request to construct one packet is received, including information on at least one header and a payload to include in the packet. The at least one header for the received request is generated and the generated at least one header is written in a first queue. The payload is requested to include in the packet and the received payload is written to a second queue.Type: ApplicationFiled: October 27, 2003Publication date: April 28, 2005Inventors: Divya Gupta, Hassan Fallah-Adl, Salil Phadnis