Patents by Inventor Divya Gupta
Divya Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12272197Abstract: It is provided a method for controlling access to a physical space secured by an electronic lock. The method is performed in an access evaluator and comprises: obtaining one or more input parameters relating to a user requesting access to the restricted physical space; evaluating a first access condition based on a credential presented by the user; evaluating a second access condition using a machine-learning model, based on the one or more input parameters; and unlocking the electronic lock when both the first access condition and the second access condition are evaluated to be true.Type: GrantFiled: November 10, 2021Date of Patent: April 8, 2025Assignee: ASSA ABLOY ABInventors: Divya Gupta, Siddharth Gaur, Jeevan Kaur, Aravindan Varadan, Priya Jindal, Bhavay Satija
-
Publication number: 20250097561Abstract: Methods and apparatus for illuminating scene areas to facilitate depth determination are described. A sequence of frames is displayed, e.g., projected, onto a scene area to illuminate the area for image capture. The sequence of frames includes a patterned frame followed by a concealing frame. The patterned frame and concealing frame are each displayed for no more than 1/60 of a second. The concealing frame maybe and sometimes does display a complementary pattern to the preceding patterned frame. When viewed sequentially by a human viewer the human sees a non-distracting uniformly illuminated scene area as a result of the effect of the concealing frame. One or more cameras are used to capture images of the illuminated area during a time in which the pattern is displayed and the scene area is effectively painted with a pattern that can facilitate depth determination based on one or more captured images.Type: ApplicationFiled: September 19, 2023Publication date: March 20, 2025Inventors: Rajiv Laroia, Divya Gupta
-
Publication number: 20250097377Abstract: Methods and apparatus for illuminating scene areas to facilitate depth determination are described. A sequence of frames is displayed, e.g., projected, onto a scene area to illuminate the area for image capture. The sequence of frames includes a patterned frame followed by a concealing frame. The patterned frame and concealing frame are each displayed for no more than 1/60 of a second. The concealing frame maybe and sometimes does display a complementary pattern to the preceding patterned frame. When viewed sequentially by a human viewer the human sees a non-distracting uniformly illuminated scene area as a result of the effect of the concealing frame. One or more cameras are used to capture images of the illuminated area during a time in which the pattern is displayed and the scene area is effectively painted with a pattern that can facilitate depth determination based on one or more captured images.Type: ApplicationFiled: January 12, 2024Publication date: March 20, 2025Inventors: Divya Gupta, Rajiv Laroia
-
Publication number: 20250095181Abstract: Methods and apparatus for illuminating scene areas to facilitate depth determination are described. A sequence of frames is displayed, e.g., projected, onto a scene area to illuminate the area for image capture. The sequence of frames includes a patterned frame followed by a concealing frame. The patterned frame and concealing frame are each displayed for no more than 1/60 of a second. The concealing frame maybe and sometimes does display a complementary pattern to the preceding patterned frame. When viewed sequentially by a human viewer the human sees a non-distracting uniformly illuminated scene area as a result of the effect of the concealing frame. One or more cameras are used to capture images of the illuminated area during a time in which the pattern is displayed and the scene area is effectively painted with a pattern that can facilitate depth determination based on one or more captured images.Type: ApplicationFiled: January 12, 2024Publication date: March 20, 2025Inventors: Divya Gupta, Rajiv Laroia
-
Patent number: 12229073Abstract: In one embodiment, an apparatus includes: a plurality of cores to execute instructions; a firmware agent to execute a first firmware; a Peripheral Component Interconnect Express (PCIe) interface to communicate with a device via a PCIe link; and a boot agent coupled to the PCIe interface to download the PCIe firmware from a non-volatile memory and provide the PCIe firmware to the PCIe interface. The PCIe interface may receive a PCIe firmware for the PCIe interface before the firmware agent is to receive the first firmware. Other embodiments are described and claimed.Type: GrantFiled: June 7, 2021Date of Patent: February 18, 2025Assignee: Intel CorporationInventors: Amit Kumar Srivastava, Divya Gupta, Michael Karas, James Mitchell, Malay Trivedi, Chung-Chi Wang
-
Publication number: 20250037072Abstract: The present disclosure relates to methods and systems that preserve privacy in a secure multi-party computation (MPC) framework in multi-agent reinforcement learning (MARL). The methods and systems use a secure MPC framework that allows for direct computation on encrypted data and enables parties to learn from others while keeping their own information private. The methods and systems provide a learning mechanism that carries out floating point operations in a privacy-preserving manner.Type: ApplicationFiled: September 26, 2023Publication date: January 30, 2025Inventors: Peeyush KUMAR, Ananta MUKHERJEE, Boling YANG, Nishanth CHANDRAN, Divya GUPTA
-
Publication number: 20240289202Abstract: Examples described herein relate to a bootable processor that comprises circuitry to load boot firmware. The bootable processor can execute a firmware that is to collect an error log of an error during boot of the bootable processor and that occurred prior to enablement of an Out of Band (OOB) manageability port. The firmware can cause output of the error log to a second circuitry through an interface that is operational prior to enablement of the OOB manageability port.Type: ApplicationFiled: May 6, 2024Publication date: August 29, 2024Inventors: Divya GUPTA, Raed AL-OMARI, Yi ZENG, Sheng HUANG
-
Publication number: 20240211332Abstract: Examples include techniques to collecting and providing error related information for a multi-die system-on-a-chip (SOC) computing system following a critical or catastrophic error. Examples include circuitry on a first die that is configured to receive an indication of a critical or catastrophic error and cause error related information to be stored to a volatile memory at the first die that is arranged to continually maintain power during a global reset of the SOC. The circuitry can also be configured to provide the stored error related information to a requestor following the global reset of the SOC.Type: ApplicationFiled: March 5, 2024Publication date: June 27, 2024Inventors: Divya GUPTA, Shubhada PUGAONKAR, Raed AL-OMARI, Mariecel TORRES-YOUNG, Ayman G. ABDO, John R. AYERS, Chih-Cheh CHEN, Wilfredo FIGUEROA MARTINEZ, Girish CHANDRASEKARAN
-
Publication number: 20240005712Abstract: It is provided a method for controlling access to a physical space secured by an electronic lock. The method is performed in an access evaluator and comprises: obtaining one or more input parameters relating to a user requesting access to the restricted physical space; evaluating a first access condition based on a credential presented by the user; evaluating a second access condition using a machine-learning model, based on the one or more input parameters; and unlocking the electronic lock when both the first access condition and the second access condition are evaluated to be true.Type: ApplicationFiled: November 10, 2021Publication date: January 4, 2024Inventors: Divya Gupta, Siddharth Gaur, Jeevan Kaur, Aravindan Varadan, Priya Jindal, Bhavay Satija
-
Publication number: 20230229594Abstract: A system detects a powerdown event, such as a power loss event, and performs a flush of volatile memory to persistent memory during a powerdown sequence. The system includes an energy backup device to power the system during the powerdown sequence. The system is configurable with optional settings that configure the powerdown sequence specific to a type of the energy backup device.Type: ApplicationFiled: December 31, 2022Publication date: July 20, 2023Inventors: Kai CHENG, Divya GUPTA, Nikethan Shivanand BALIGAR, Vivek GARG, Aurelio RODRIGUEZ ECHEVARRIA, Russell J. WUNDERLICH
-
Publication number: 20230032519Abstract: A secure inference over Deep Neural Networks (DNNs) using secure two-party computation to perform privacy-preserving machine learning. The secure inference uses a particular type of comparison that can be used as a building block for various layers in the DNN including, for example, ReLU activations and divisions. The comparison securely computes a Boolean share of a bit representing whether input value x is less than input value y, where x is held by a user of the DNN, and where y is held by a provider of the DNN. Each party computing system parses their input into leaf strings of multiple bits. This is much more efficient than if the leaf strings were individual bits. Accordingly, the secure inference described herein is more readily adapted for using in complex DNNs.Type: ApplicationFiled: October 30, 2020Publication date: February 2, 2023Inventors: Nishanth CHANDRAN, Divya GUPTA, Aseem RASTOGI, Rahul SHARMA, Nishant KUMAR, Mayank RATHEE, Deevashwer RATHEE
-
Publication number: 20220329581Abstract: Systems and methods for selectively authenticating an untrusted device based on a trust level are disclosed. The system can include transmitting an authentication request from a first device seeking to authenticate a second device to access to an account. The first device receives an authentication token that can be used by the second device for authentication. The authentication token can be transmitted wirelessly to the second device or can be scanned by the second device in the case that the token is a scannable image displayed on the first device. The systems can determine a trust level for the second device based on an association between the first device and the second device. The system can provide the second device a degree of access to the account that relates to the trust level.Type: ApplicationFiled: April 12, 2021Publication date: October 13, 2022Inventors: Zainab Zaki, Divya Gupta, Brian Choe
-
Patent number: 11405181Abstract: A system includes a set of low resource devices, each configured to receive transactions to be added to an encrypted block chain ledger from a sample of untrusted high resource devices, prepare a proposed block of the received transactions, provide the proposed block to the sample of untrusted high resource devices, receive proposed blocks from the untrusted high resource devices originating from the set of low resource devices. The low resource devices run a consensus protocol to select one proposed block to add to the encrypted block chain ledger stored on the untrusted high resource devices.Type: GrantFiled: July 12, 2019Date of Patent: August 2, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Apurv Mehra, Satyanarayana V. Lokam, Sambhav Satija, Sudheesh Singanamalla
-
Publication number: 20210294772Abstract: In one embodiment, an apparatus includes: a plurality of cores to execute instructions; a firmware agent to execute a first firmware; a Peripheral Component Interconnect Express (PCIe) interface to communicate with a device via a PCIe link; and a boot agent coupled to the PCIe interface to download the PCIe firmware from a non-volatile memory and provide the PCIe firmware to the PCIe interface. The PCIe interface may receive a PCIe firmware for the PCIe interface before the firmware agent is to receive the first firmware. Other embodiments are described and claimed.Type: ApplicationFiled: June 7, 2021Publication date: September 23, 2021Inventors: Amit Kumar Srivastava, Divya Gupta, Michael Karas, James Mitchell, Malay Trivedi, Chung-Chi Wang
-
Publication number: 20210014042Abstract: A system includes a set of low resource devices, each configured to receive transactions to be added to an encrypted block chain ledger from a sample of untrusted high resource devices, prepare a proposed block of the received transactions, provide the proposed block to the sample of untrusted high resource devices, receive proposed blocks from the untrusted high resource devices originating from the set of low resource devices. The low resource devices run a consensus protocol to select one proposed block to add to the encrypted block chain ledger stored on the untrusted high resource devices.Type: ApplicationFiled: July 12, 2019Publication date: January 14, 2021Inventors: Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Apurv Mehra, Satyanarayana V. Lokam, Sambhav Satija, Sudheesh Singanamalla
-
Patent number: 10671027Abstract: In embodiments, a system may comprise a circuit component to perform a function; and a supervisor component (e.g., a safety component) coupled to the circuit component to monitor proper functioning of the circuit component. The circuit component may be configured to initiate provision of diagnostic information to the supervisor component, or to indicate to the safety component whether the circuit component will be responsive to a query from the safety component for diagnostic information.Type: GrantFiled: June 20, 2018Date of Patent: June 2, 2020Assignee: Intel CorporationInventors: Gabriele Boschi, Alessandro Campinoti, Jennifer Wang, Divya Gupta
-
Patent number: 10460234Abstract: Systems and methods for private deep neural network training are disclosed. Method includes storing first private values at first machine and second private values at second machine; providing, to third machine, first share of first private values and first share of second private values; providing, to fourth machine, second share of first private values and second share of second private values; computing, at third machine, third machine-value based on first share of first private values and first share of second private values; computing, at fourth machine, fourth machine-value based on second share of first private values and second share of second private values; providing, to first machine and second machine, third machine-value and fourth machine-value; and computing, at first machine, a mathematical function of first private values and second private values, mathematical function being computed based on first private values stored at first machine, third machine-value, and fourth machine-value.Type: GrantFiled: March 9, 2018Date of Patent: October 29, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Nishanth Chandran, Divya Gupta, Sameer Wagh
-
Patent number: 10417119Abstract: A method for automated software testing may include mapping test cases to lines in files in a codebase. Each test case covers one or more lines in one or more files and has corresponding test results. The method may further include obtaining a change list including one or more changes. Each change specifies a changed line in a changed file. The method may further include determining impacted test cases, based on the mapping and the change list, prioritizing the impacted test cases based, in part, on test results corresponding to each impacted test case, executing, based on the prioritization, one or more impacted test cases to obtain executed test cases, and obtaining, for each executed test case, new test results.Type: GrantFiled: April 28, 2016Date of Patent: September 17, 2019Assignee: INTUIT INC.Inventors: Sachin Francis, Divya Gupta, Ayush Datta, Vijay Thomas
-
Publication number: 20190228299Abstract: Systems and methods for private deep neural network training are disclosed. Method includes storing first private values at first machine and second private values at second machine; providing, to third machine, first share of first private values and first share of second private values; providing, to fourth machine, second share of first private values and second share of second private values; computing, at third machine, third machine-value based on first share of first private values and first share of second private values; computing, at fourth machine, fourth machine-value based on second share of first private values and second share of second private values; providing, to first machine and second machine, third machine-value and fourth machine-value; and computing, at first machine, a mathematical function of first private values and second private values, mathematical function being computed based on first private values stored at first machine, third machine-value, and fourth machine-value.Type: ApplicationFiled: March 9, 2018Publication date: July 25, 2019Inventors: Nishanth Chandran, Divya Gupta, Sameer Wagh
-
Publication number: 20190049905Abstract: In embodiments, a system may comprise a circuit component to perform a function; and a supervisor component (e.g., a safety component) coupled to the circuit component to monitor proper functioning of the circuit component. The circuit component may be configured to initiate provision of diagnostic information to the supervisor component, or to indicate to the safety component whether the circuit component will be responsive to a query from the safety component for diagnostic information.Type: ApplicationFiled: June 20, 2018Publication date: February 14, 2019Inventors: Gabriele Boschi, Alessandro Campinoti, Jennifer Wang, Divya Gupta