Patents by Inventor Gaurav MATHUR

Gaurav MATHUR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210322853
    Abstract: A system and method for facilitating physical therapy that may include a wearable display, wearable sensors disposed at varying positions on a user, a processor comprising executable instructions configured to provide a virtual reality environment, virtual characters, and therapeutic activities on the wearable display, wherein the virtual characters interact with the user to provide at least form feedback and positive reinforcement. A new instance of the virtual reality environment, with identifiable differences, may be generated in response to a measured completion or partial completion of a therapeutic activity. Changes in the virtual reality environment may offer users continued indications of progression throughout the duration of a physical therapy program.
    Type: Application
    Filed: July 22, 2019
    Publication date: October 21, 2021
    Inventors: Arthur John Lockhart, Seppo Helava, Gaurav Mathur, David Hill, Albert Hing-Yin Chen, Joseph White
  • Publication number: 20210312724
    Abstract: This application is directed to communicating vehicle data via a vehicle data feed server that is communicatively coupled to a plurality of vehicles. A plurality of credentials and associated access levels are stored in a database of the vehicle data feed server. The vehicle data feed server receives a plurality of real-time vehicle data flows from the vehicles. These real-time vehicle data flows are optionally associated with the credentials based on the associated access levels. Upon receiving from a user of a client device a user credential and a vehicle data request, the vehicle data feed server determines whether the user is authorized to access vehicle data that is associated with the user credential and includes a subset of the real-time vehicle data flows. The subset of the real-time vehicle data flows is forwarded to the client device when the user is authorized to access the vehicle data.
    Type: Application
    Filed: March 25, 2021
    Publication date: October 7, 2021
    Inventors: Robert J. Petri, Gregory Lorin Limes, Benjamin Black, Sean James Cullen, Marc A. Spehlmann, Ning Zhang, Andreas M. Kasprzok, David W. Bryson, Jagannath Timma, Gaurav Mathur, Richard G. Hallman, Carlos Garcia Alvarado, Jason Paul Hum
  • Patent number: 10585817
    Abstract: A method of testing signal integrity and power integrity in an address bus includes determining a worst case switching scenario for victim bits versus aggressor bits on addresses on the address bus, generating a second switching scenario by eliminating repeated patterns and non-switching patterns for victim bits and aggressor bits, simulating address bus operation with the second switching scenario, and iteratively correlating simulation results with measured results to match simulated results with measured results.
    Type: Grant
    Filed: May 29, 2018
    Date of Patent: March 10, 2020
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventors: Nitin Kumar Chhabra, Gaurav Mathur, Anant Dalimkar
  • Publication number: 20190370192
    Abstract: A method of testing signal integrity and power integrity in an address bus includes determining a worst case switching scenario for victim bits versus aggressor bits on addresses on the address bus, generating a second switching scenario by eliminating repeated patterns and non-switching patterns for victim bits and aggressor bits, simulating address bus operation with the second switching scenario, and iteratively correlating simulation results with measured results to match simulated results with measured results.
    Type: Application
    Filed: May 29, 2018
    Publication date: December 5, 2019
    Inventors: Nitin Kumar CHHABRA, Gaurav MATHUR, Anant DALIMKAR
  • Publication number: 20190108301
    Abstract: A method of generating a chip power model (CPM) for a chip by determining a current profile measurement on a validation board for the chip, and stressing the chip using a plurality of stress factors. A stressed measured waveform is captured and stored. A CPM is generated with the measured waveform captured using the plurality of stress factors. A simulation waveform is captured and stored from the CPM. The measured and simulation waveforms are compared, and when the measured and simulation waveforms do not match, at least one parameter of the CPM is modified iteratively until the measured and simulation waveforms match.
    Type: Application
    Filed: October 5, 2017
    Publication date: April 11, 2019
    Inventors: Nitin Kumar Chhabra, Pritesh Mahadev Pawaskar, William Harrison Hempy, II, Gaurav Mathur
  • Patent number: 9917810
    Abstract: A method, system, and computer program product for short messaging service (SMS) aggregation system setup. A computing platform (e.g., a server, a multi-processor server, a cloud array, a processor, etc.) is configured to receive messages over a network (e.g., an aggregator carrier network) and to deliver the messages to a processing entity executing on the computing platform. The processing entity receives messages comprising a set of SMS configuration parameters such as SMS configuration parameters to identify an SMS aggregator identifier and SMS configuration parameters comprising an aggregator network type and/or an aggregator carrier name. The SMS configuration parameters are stored for later retrieval and used when formatting and sending SMS messages.
    Type: Grant
    Filed: December 9, 2014
    Date of Patent: March 13, 2018
    Assignee: Oracle International Corporation
    Inventors: Suresh Kumar Kalyanaraman, Taran Deep Arora, Sandeep Kumar Gain, Gaurav Mathur
  • Patent number: 9690344
    Abstract: An embodiment is a circuit including a main power supply coupled to a first node, a charge reservoir coupled between a second node and ground, an isolation circuit coupled between the first node and the second node, and a plurality of secondary power supplies coupled to the second node, the plurality of secondary power supplies configured to receive power from the main power supply. The circuit further includes a detector circuit coupled to the first node, the detector circuit configured to detect the presence and absence of a first supply voltage at the first node, and a timing circuit coupled between the detector circuit and the plurality of secondary power supplies, the timing circuit configured to enable and disable the plurality of secondary power supplies in predetermined sequences based on the detection of the first supply voltage by the detector circuit.
    Type: Grant
    Filed: October 16, 2014
    Date of Patent: June 27, 2017
    Assignee: STMICROELECTRONICS INTERNATIONAL N.V.
    Inventors: Pratik Damle, Gaurav Mathur, Vikram Singh
  • Publication number: 20170118174
    Abstract: Systems, methods, and software described herein provide encryption configurations to application containers. In one example, a method of operating a management system to provide VPN configurations to application containers in an application container environment includes identifying two application containers in the application container environment for secure communication, and identifying a VPN configuration for the two application containers. The method further includes configuring the two application containers for secure communication by transferring the VPN configuration to security layers within each of the two application containers.
    Type: Application
    Filed: January 5, 2017
    Publication date: April 27, 2017
    Inventors: Gaurav Mathur, Vibhav Sreekanti
  • Patent number: 9635055
    Abstract: Systems, methods, and software described herein provide encryption configurations for secure application containers. In one example, a method of operating a management system to provide encryption configurations to secure application containers includes identifying an encryption configuration from a plurality of encryption configurations for an application container. The method further includes transferring the encryption configuration to the application container, wherein the encryption configuration configures a security layer in the application container to act as an encryption intermediary between an application in the application container and processes external to the application container.
    Type: Grant
    Filed: January 28, 2015
    Date of Patent: April 25, 2017
    Assignee: defend7, Inc.
    Inventors: Gaurav Mathur, Vibhav Sreekanti
  • Publication number: 20170054747
    Abstract: Systems, methods, and software provided herein manage behavioral data for application components in a computing environment. In one example, a method of operating collection service includes receiving behavior reports for application containers in a computing environment. Once received, behavioral data in the behavior reports is stored in a tree data structure, wherein the tree data structure includes nodes for various time periods. Once the behavioral data is stored, a request may be generated for a portion of the behavioral data over a defined time period. In response to the request, a response summary may be generated based on the tree data structure and the defined time period.
    Type: Application
    Filed: August 5, 2016
    Publication date: February 23, 2017
    Inventors: Vibhav Sreekanti, Gaurav Mathur, Richard Spillane, Gordon Chaffee
  • Publication number: 20170054746
    Abstract: Systems, methods, and software provided herein identify unverified behavior in an application component environment. In one example, a method of operating a collection service includes receiving communication data for a plurality of application components and generating a baseline set of communication interactions for the application component environment based on the communication data. The method further includes receiving additional communication data for the application components and generating a second set of communication interactions for the application component environment based on the communication data. The method also provides identifying a differential set of communication interactions by comparing the baseline set and the second set of communication interactions.
    Type: Application
    Filed: August 5, 2016
    Publication date: February 23, 2017
    Inventors: Vibhav Sreekanti, Gaurav Mathur, Richard Spillane, Gordon Chaffee
  • Patent number: 9544275
    Abstract: Systems, methods, and software described herein provide encryption configurations to application containers. In one example, a method of operating a management system to provide VPN configurations to application containers in an application container environment includes identifying two application containers in the application container environment for secure communication, and identifying a VPN configuration for the two application containers. The method further includes configuring the two application containers for secure communication by transferring the VPN configuration to security layers within each of the two application containers.
    Type: Grant
    Filed: January 28, 2015
    Date of Patent: January 10, 2017
    Assignee: defend7, Inc.
    Inventors: Gaurav Mathur, Vibhav Sreekanti
  • Publication number: 20160342801
    Abstract: Systems, methods, and software described herein provide security preferences to application containers executing independently on a host computing system. In one example, a method of operating a management service to manage security preferences for containerized applications includes receiving an initiation request from a security module in an application container. The method further provides, responsive to the request, identifying configuration parameters for the application container, the configuration parameters corresponding to unique security preferences based on one or more applications in the application container, and transferring the configuration parameters to the application container.
    Type: Application
    Filed: October 21, 2014
    Publication date: November 24, 2016
    Inventors: Vibhav Sreekanti, Gaurav Mathur
  • Publication number: 20160301585
    Abstract: Systems, methods, and software provided herein generate a visual representation of communication between application components. In one example, a method of operating a method of operating a collection service system includes receiving a plurality of communication reports representing communications for application components, and storing the communication data from the plurality of communication reports in one or more data structures. The method further provides identifying administrator defined display parameters for the communication data, and generating a visual representation of the application components based on the display parameters and the one or more data structures.
    Type: Application
    Filed: April 13, 2016
    Publication date: October 13, 2016
    Inventors: Vibhav Sreekanti, Gaurav Mathur, Richard Spillane, Gordon Chaffee
  • Publication number: 20160292431
    Abstract: Systems, methods, and software to manage encryption keys in an application container environment are provided. In one example, a method of managing encryption keys comprises identifying a plurality of data objects to encrypt and encrypting the plurality of data objects via a plurality of encryption keys. The method further provides generating supplemental data for each data object, wherein the supplemental data for each data object comprises a key identifier that corresponds to an encryption key used to encrypt each data object. The method further includes associating the supplemental data for each data object with the encrypted version of each data object, and organizing the key identifiers from the plurality of data objects into a data structure with the plurality of encryption keys.
    Type: Application
    Filed: April 2, 2015
    Publication date: October 6, 2016
    Inventors: Vibhav Sreekanti, Gaurav Mathur, Richard Spillane, Gordon Chaffee
  • Publication number: 20160219019
    Abstract: Systems, methods, and software described herein provide encryption configurations to application containers. In one example, a method of operating a management system to provide VPN configurations to application containers in an application container environment includes identifying two application containers in the application container environment for secure communication, and identifying a VPN configuration for the two application containers. The method further includes configuring the two application containers for secure communication by transferring the VPN configuration to security layers within each of the two application containers.
    Type: Application
    Filed: January 28, 2015
    Publication date: July 28, 2016
    Inventors: Gaurav Mathur, Vibhav Sreekanti
  • Publication number: 20160219073
    Abstract: Systems, methods, and software described herein provide encryption configurations for secure application containers. In one example, a method of operating a management system to provide encryption configurations to secure application containers includes identifying an encryption configuration from a plurality of encryption configurations for an application container. The method further includes transferring the encryption configuration to the application container, wherein the encryption configuration configures a security layer in the application container to act as an encryption intermediary between an application in the application container and processes external to the application container.
    Type: Application
    Filed: January 28, 2015
    Publication date: July 28, 2016
    Inventors: Gaurav Mathur, Vibhav Sreekanti
  • Publication number: 20160164824
    Abstract: A method, system, and computer program product for short messaging service (SMS) aggregation system setup. A computing platform (e.g., a server, a multi-processor server, a cloud array, a processor, etc.) is configured to receive messages over a network (e.g., an aggregator carrier network) and to deliver the messages to a processing entity executing on the computing platform. The processing entity receives messages comprising a set of SMS configuration parameters such as SMS configuration parameters to identify an SMS aggregator identifier and SMS configuration parameters comprising an aggregator network type and/or an aggregator carrier name. The SMS configuration parameters are stored for later retrieval and used when formatting and sending SMS messages.
    Type: Application
    Filed: December 9, 2014
    Publication date: June 9, 2016
    Applicant: Oracle International Corporation
    Inventors: Suresh Kumar KALYANARAMAN, Taran Deep ARORA, Sandeep Kumar GAIN, Gaurav MATHUR
  • Publication number: 20160109933
    Abstract: An embodiment is a circuit including a main power supply coupled to a first node, a charge reservoir coupled between a second node and ground, an isolation circuit coupled between the first node and the second node, and a plurality of secondary power supplies coupled to the second node, the plurality of secondary power supplies configured to receive power from the main power supply. The circuit further includes a detector circuit coupled to the first node, the detector circuit configured to detect the presence and absence of a first supply voltage at the first node, and a timing circuit coupled between the detector circuit and the plurality of secondary power supplies, the timing circuit configured to enable and disable the plurality of secondary power supplies in predetermined sequences based on the detection of the first supply voltage by the detector circuit.
    Type: Application
    Filed: October 16, 2014
    Publication date: April 21, 2016
    Inventors: Pratik Damle, Gaurav Mathur, Vikram Singh
  • Publication number: 20150379287
    Abstract: Systems, methods, and software described herein provision secure application containers. In one example, a method of operating a provisioning system to provision secure application containers includes identifying an application to provision. The method further includes, in response to identifying the application, provisioning a secure application container for the application, the secure application container comprising a security layer for the application and the application.
    Type: Application
    Filed: October 22, 2014
    Publication date: December 31, 2015
    Inventors: Gaurav Mathur, Vibhav Sreekanti