Patents by Inventor Durgesh
Durgesh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230281272Abstract: Described herein is a graphics processor including a plurality of processing clusters coupled with a host interface, each processing cluster comprising a plurality of multiprocessors, the plurality of multiprocessors interconnected via a data interconnect, and each multiprocessor comprising sparse matrix multiply acceleration hardware including a systolic processing array with feedback inputs.Type: ApplicationFiled: April 17, 2023Publication date: September 7, 2023Applicant: Intel CorporationInventors: SUBRAMANIAM MAIYURAN, JORGE PARRA, SUPRATIM PAL, ASHUTOSH GARG, SHUBRA MARWAHA, CHANDRA GURRAM, DARIN STARKEY, DURGESH BORKAR, VARGHESE GEORGE
-
Patent number: 11726565Abstract: Context aware backlighting techniques include determining a focal point of a display space based on a user display context. An example backlight controller for selective backlight control of a monitor includes interface circuitry, memory, machine-readable instructions, and processor circuitry to execute the machine readable instructions to obtain a user display context relative to the monitor, the user display context based on sensor data, the sensor data to include user proximity data; determine whether to enable or disable the selective backlighting for the monitor based on the user display context; cause first backlight sections of the monitor to output at a first light intensity based on the user display context; and cause second backlight sections of the monitor to output at least one of (a) the first light intensity or (b) a second light intensity that is different than the first light intensity based on the determination.Type: GrantFiled: July 25, 2022Date of Patent: August 15, 2023Assignee: Intel CorporationInventors: Dhaval V. Sharma, Nivruti Rai, Durgesh Srivastava, Shobhit Kumar
-
Publication number: 20230231850Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.Type: ApplicationFiled: March 20, 2023Publication date: July 20, 2023Applicant: Google LLCInventors: ll-Sung Lee, Sidharth Durgesh Telang, Jimmy C. Chau, Timothy Matthew Dierks, Ariel Joseph Feldman, Hunter James Freyer, Gregory David Laun, Tianyuan Liu, Pedro Henrique Ribeiro Morais E Silva, Aditya Sinha, Xioalan Zhang, Netanel Keidar
-
Publication number: 20230217354Abstract: A cell range determination is made by determining a sector straddling an azimuth line of a first base station with a center at the coordinates of a first base station. The sector is divided into a plurality of subsectors. A nearest neighbor base station is determined in each of the plurality of subsectors. A set of coordinates is determined for the nearest neighbor base station. An average distance between the nearest neighbor base stations is determined. A bearing angle difference between the nearest neighbor base station and the first base station is determined based on the set of coordinates of the nearest neighbor base station. A gain is determined for each of the plurality of subsectors based on the bearing angle difference. A cell range is determined for the first base station based on the gain.Type: ApplicationFiled: January 4, 2022Publication date: July 6, 2023Inventors: Atul Singh RAJPOOT, Sudeep Kumar JAIN, Durgesh RATHORE, Dharambir BHARTI
-
Publication number: 20230217270Abstract: An acceptable coverage limit of a base station is identified by retrieving a list of cells that are served by a first base station. Grids are generated from the first base station to a predetermined threshold distance. A plurality of selected grids is identified between an acceptable coverage limit and a threshold distance. An average reference signal is determined from the plurality of selected grids. An evaluation is made regarding whether the first base station is the dominant cell in each of the selected grids. The number of grids the selected grids where the first base station is the dominant cell site is determined based on a dominant carrier threshold. A column of grids is determined where the first base station is not the dominant cell site. An acceptable coverage limit of the cell is determined based on the distance from the first base station and the column of grids.Type: ApplicationFiled: January 4, 2022Publication date: July 6, 2023Inventors: Atul Singh RAJPOOT, Sudeep Kumar JAIN, Durgesh RATHORE, Dharambir BHARTI
-
Publication number: 20230209472Abstract: A booming cell start distance and recommended electronic tilt is identified by retrieving a list of cells served by a first base station. A plurality of grids is generated from the first base station to a predetermined threshold distance. A plurality of selected grids is identified between an acceptable coverage limit and a threshold distance. An evaluation is made regarding whether the first base station is not the dominant cell in each of the selected grids based. The number of grids where the first base station is not the dominant cell site is determined based on a dominant carrier threshold. A column of grids where the first base station is no longer the dominant cell site is determined based on the dominant carrier threshold. A bad booming distance of the cell is determined based on the distance from the first base station and the determined column of grids.Type: ApplicationFiled: December 28, 2021Publication date: June 29, 2023Inventors: Atul Singh RAJPOOT, Sudeep Kumar JAIN, Durgesh RATHORE, Dharambir BHARTI
-
Patent number: 11681439Abstract: An embodiment of an electronic apparatus may include one or more substrates, and logic coupled to the one or more substrates, the logic to allocate a first memory portion to a first application as a combination of a local memory and remote memory, wherein the remote memory is shared between multiple compute nodes, and manage a first memory balloon associated with the first memory portion based on two or more memory tiers associated with the local memory and the remote memory. Other embodiments are disclosed and claimed.Type: GrantFiled: June 26, 2020Date of Patent: June 20, 2023Assignee: Intel CorporationInventors: Rasika Subramanian, Lidia Warnes, Francesc Guim Bernat, Mark A. Schmisseur, Durgesh Srivastava
-
Patent number: 11677541Abstract: A method is provided for securely accessing code in an external memory. In the method, plaintext code may be stored in internal memory as sets of multiple blocks, each of the multiple blocks having N-bits. The code is encrypted and stored in the external memory. A block cipher having an authenticated encryption mode is used to convert the plaintext code to ciphertext code plus an authentication tag corresponding to each set of the multiple blocks. The external memory is formatted to store the ciphertext and the authentication tag. A translated address for the ciphertext is created from a plaintext address. During a read operation, the generated authentication tag is checked with an expected authentication tag. If the check is successful, the ciphertext code is decrypted and provided to a CPU for execution as plaintext code. In one embodiment, the CPU executes the plaintext code “in place” in the external memory.Type: GrantFiled: October 12, 2021Date of Patent: June 13, 2023Assignee: NXP B.V.Inventors: Miroslav Knezevic, Tuongvu Van Nguyen, Durgesh Pattamatta, Tung-Hao Huang
-
Patent number: 11665660Abstract: A booming cell site is identified in a cloud native environment by retrieve an on-air base station from a site database, retrieve a timing advance distribution (TAD) key performance indicator data for a cell site served by the on-air base station from the list, determine a count of configured gaps for the cell site in the timing advance distribution key performance indicator data, determine a count of booming samples that lie beyond the configured count of gaps for the cell site based on the timing advance distribution key performance indicator data, determine a sum of the timing advance distribution key performance indicator data available for the cell site, and determine the percentage of booming cells based on the count of booming samples and the sum of the timing advance distribution key performance indicator.Type: GrantFiled: December 28, 2021Date of Patent: May 30, 2023Assignee: RAKUTEN SYMPHONY SINGAPORE PTE. LTD.Inventors: Atul Singh Rajpoot, Sudeep Kumar Jain, Durgesh Rathore, Dharambir Bharti
-
Patent number: 11661438Abstract: Methods of removing high molecular weight species, in particular aggregates, from antibody drug conjugate preparations, by contacting preparations of the antibody drug conjugate reaction mixture with a hydroxyapatite resin and selectively eluting the ADC from the resin using a gradient comprising sodium phosphate.Type: GrantFiled: December 7, 2016Date of Patent: May 30, 2023Assignee: Pfizer, Inc.Inventors: Durgesh V. Nadkarni, Jeffry R. Borgmeyer, He Meng, Qingping Jiang
-
Patent number: 11636181Abstract: Disclosed are examples of systems, apparatus, methods and computer program products for sharing and publishing files. In one aspect, the database system can maintain a user database, a file database and a library. The database system can receive a first request initiated by a first user to share a first file with one or more second users and, responsive to the first request, enable a second set of one or more permissions for each of the second users. The database system also can receive a second request initiated by the first user to publish the first file to the library and, responsive to the second request, publish the first file to the library. The database system additionally can restrict access to the published file based on permissions associated with the library.Type: GrantFiled: May 6, 2021Date of Patent: April 25, 2023Assignee: Salesforce, Inc.Inventors: Miko Arnab Bose, Robert J. Snell, Mark Francis Movida, Valliappan Annamalai Natarajan, Adam Thielemann Wegel, Matthew Charles Hagenian, Durgesh Singh
-
Patent number: 11636174Abstract: Described herein is an accelerator device including a host interface, a fabric interconnect coupled with the host interface, and one or more hardware tiles coupled with the fabric interconnect, the one or more hardware tiles including sparse matrix multiply acceleration hardware including a systolic array with feedback inputs.Type: GrantFiled: November 16, 2021Date of Patent: April 25, 2023Assignee: Intel CorporationInventors: Subramaniam Maiyuran, Jorge Parra, Supratim Pal, Ashutosh Garg, Shubra Marwaha, Chandra Gurram, Darin Starkey, Durgesh Borkar, Varghese George
-
Publication number: 20230114689Abstract: A method is provided for securely accessing code in an external memory. In the method, plaintext code may be stored in internal memory as sets of multiple blocks, each of the multiple blocks having N-bits. The code is encrypted and stored in the external memory. A block cipher having an authenticated encryption mode is used to convert the plaintext code to ciphertext code plus an authentication tag corresponding to each set of the multiple blocks. The external memory is formatted to store the ciphertext and the authentication tag. A translated address for the ciphertext is created from a plaintext address. During a read operation, the generated authentication tag is checked with an expected authentication tag. If the check is successful, the ciphertext code is decrypted and provided to a CPU for execution as plaintext code. In one embodiment, the CPU executes the plaintext code “in place” in the external memory.Type: ApplicationFiled: October 12, 2021Publication date: April 13, 2023Inventors: Miroslav Knezevic, Tuongvu Van Nguyen, Durgesh Pattamatta, Tung-Hao Huang
-
Publication number: 20230092541Abstract: Methods and apparatus to minimize hot/cold page detection overhead on running workloads. A page meta data structure is populated with meta data associated with memory pages in one or more far memory tier. In conjunction with one or more processes accessing memory pages to perform workloads, the page meta data structure is updated to reflect accesses to the memory pages. The page meta data, which reflects the current state of memory, is used to determine which pages are “hot” pages and which pages are “cold” pages, wherein hot pages are memory pages with relatively higher access frequencies and cold pages are memory pages with relatively lower access frequencies. Variations on the approach including filtering meta data updates on pages in memory regions of interest and applying a filter(s) to trigger meta data updates based on (a) condition(s). A callback function may also be triggered to be executed synchronously with memory page accesses.Type: ApplicationFiled: September 23, 2021Publication date: March 23, 2023Inventors: Francois DUGAST, Durgesh SRIVASTAVA, Sujoy SEN, Lidia WARNES, Thomas E. WILLIS, Bassam N. COURY
-
Patent number: 11611558Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.Type: GrantFiled: November 13, 2019Date of Patent: March 21, 2023Assignee: Google LLCInventors: Il-Sung Lee, Sidharth Durgesh Telang, Jimmy C. Chau, Timothy Matthew Dierks, Ariel Joseph Feldman, Hunter James Freyer, Netanel Keidar, Gregory David Laun, Tianyuan Liu, Pedro Henrique Ribeiro Morais e Silva, Aditya Sinha, Xioalan Zhang
-
Publication number: 20230063743Abstract: A method is provided for secure provisioning of a device. In the method, a plurality of integrated circuit (IC) devices is manufactured by a first entity for use in the device. The first entity provides signed provisioning software and stores in at least one provisioning IC device one or more keys used for provisioning the plurality of ICs. The provisioning device with the signed provisioning software is provided to a second entity. The second entity verifies the provisioning software using a stored key. The provisioning software encrypts provisioning assets provided by the second entity and provides the encrypted provisioning assets to the third entity. The signed provisioning software is provided to a third entity by the first entity. During manufacturing of the manufactured products by the third entity, the provisioning software verifies and decrypts the encrypted provisioning assets of the second entity to provision all the plurality of IC devices.Type: ApplicationFiled: August 24, 2021Publication date: March 2, 2023Inventors: Björn Fay, Miroslav Knezevic, Durgesh Pattamatta, Alexander Vogt
-
Patent number: 11593755Abstract: A method for stock keeping in a store includes: accessing an image captured by a fixed camera within the store; retrieving a field of view of the fixed camera; estimating a segment of an inventory structure in the store depicted in the image based on a projection of the field of view onto a planogram of the store; identifying a set of slots within the inventory structure segment; retrieving a product model representing a set of visual characteristics of a product type assigned to a slot, in the set of slots, by the planogram; extracting a constellation of features from the image; if the constellation of features approximates the set of visual characteristics in the product model, detecting presence of a product unit of the product type occupying the inventory structure segment; and representing presence of the product unit, occupying the inventory structure segment, in a realogram.Type: GrantFiled: May 21, 2020Date of Patent: February 28, 2023Assignee: Simbe Robotics, Inc.Inventors: Bradley Bogolea, Mirza Akbar Shah, Lorin Vandegrift, Luke Fraser, Jariullah Safi, Jeffrey Gee, Durgesh Tiwari
-
Patent number: 11573722Abstract: An embodiment of an electronic apparatus may include one or more substrates, and logic coupled to the one or more substrates, the logic to provide an interface to a pooled memory that is configured as a combination of local memory and remote memory, wherein the remote memory is shared between multiple compute nodes, allocate respective memory portions of the pooled memory to respective tenants, associate respective memory balloons with the respective tenants that correspond to the allocated respective memory portions, and manage the respective memory balloons based on the respective tenants and two or more memory tiers associated with the pooled memory. Other embodiments are disclosed and claimed.Type: GrantFiled: August 6, 2020Date of Patent: February 7, 2023Assignee: Intel CorporationInventors: Rasika Subramanian, Lidia Warnes, Francesc Guim Bernat, Mark A. Schmisseur, Durgesh Srivastava
-
Patent number: 11514398Abstract: One variation of a method for deploying fixed cameras within a store includes: dispatching a robotic system to autonomously navigate along a set of inventory structures in the store and generate a spatial map of the store during a scan cycle; generating an accessibility heatmap representing accessibility of regions of the store to the robotic system based on the spatial map; generating a product value heatmap for the store based on locations and sales volumes of products in the store; accessing a number of fixed cameras allocated to the store; generating a composite heatmap for the store based on the accessibility heatmap and the product value heatmap; identifying a subset of inventory structures occupying a set of locations within the store corresponding to critical amplitudes in the composite heatmap; and generating a prompt to install the number of fixed cameras facing the subset of inventory structures in the store.Type: GrantFiled: December 7, 2020Date of Patent: November 29, 2022Assignee: Simbe Robotics, Inc.Inventors: Bradley Bogolea, Durgesh Tiwari
-
Publication number: 20220357795Abstract: Context aware backlighting techniques include determining a focal point of a display space based on a user display context. An example backlight controller for dynamic backlight control of a monitor includes interface circuitry, memory, machine-readable instructions, and processor circuitry to execute the machine readable instructions to obtain a user display context relative to the monitor, the user display context based on sensor data, the sensor data to include user proximity data; determine whether to enable or disable the dynamic backlighting for the monitor based on the user display context; cause first backlight sections of the monitor to output at a first light intensity based on the user display context; and cause second backlight sections of the monitor to output at least one of (a) the first light intensity or (b) a second light intensity that is different than the first light intensity based on the determination.Type: ApplicationFiled: July 25, 2022Publication date: November 10, 2022Inventors: Dhaval V. Sharma, Nivruti Rai, Durgesh Srivastava, Shobhit Kumar