Patents by Inventor George Madathilparambil George

George Madathilparambil George has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120195316
    Abstract: Datalink frames or networking packets contain protocol information in the header and optionally in the trailer of a frame or a packet. We are proposing a method in which part of or all of the protocol information corresponding to a frame or a packet is transmitted separately in another datalink frame. The “Separately Transmitted Protocol Information” is referred to as STPI. The STPI contains enough protocol information to identify the next hop node or port. STPI can be used avoid network congestion and improve link efficiency. Preferably, there will be one datalink frame or network packet corresponding to each STPI, containing the data and the rest of the protocol information and this frame/packet is referred to as DFoNP. The creation of STPI and DFoNP is done by the originator of the frame or packet such as an operating system.
    Type: Application
    Filed: February 6, 2012
    Publication date: August 2, 2012
    Inventors: George Madathilparambil George, Susan George, Mammen Thomas
  • Patent number: 8139574
    Abstract: Datalink frames or networking packets contain protocol information in the header and optionally in the trailer of a frame or a packet. We are proposing a method in which part of or all of the protocol information corresponding to a frame or a packet is transmitted separately in another datalink frame. The “Separately Transmitted Protocol Information” is referred to as STPI. The STPI contains enough protocol information to identify the next hop node or port. STPI can be used avoid network congestion and improve link efficiency. Preferably, there will be one datalink frame or network packet corresponding to each STPI, containing the data and the rest of the protocol information and this frame/packet is referred to as DFoNP. The creation of STPI and DFoNP is done by the originator of the frame or packet such as an operating system.
    Type: Grant
    Filed: August 18, 2006
    Date of Patent: March 20, 2012
    Inventors: George Madathilparambil George, Susan George, Mammen Thomas
  • Publication number: 20100023522
    Abstract: A high level of computer security can be achieved by controlling read/write/execute access to files, controlling incoming or outgoing network connections, controlling incoming or outgoing network traffic and controlling privileged operations based on states of Application Security Environments and/or based on states of users or groups of users and/or based on states of privilege objects. These states can be controlled dynamically by software or by one or more hardware devices.
    Type: Application
    Filed: July 18, 2008
    Publication date: January 28, 2010
    Inventors: George Madathilparambil George, Nikhil George
  • Publication number: 20100002714
    Abstract: Low communication latency, low cost and high scalability can be achieved by allowing PCI or PCI-X or PCI Express for connectivity between computers or embedded systems and network switches and for connectivity between network switches. These technologies can also be used for interconnecting storage area network switches, computers and mass-memory controllers. PCI Express root bridges in computers or embedded systems can be connected directly to network switch ports.
    Type: Application
    Filed: July 1, 2008
    Publication date: January 7, 2010
    Inventors: George Madathilparambil George, Susan George
  • Publication number: 20090263003
    Abstract: A method for dividing value space of parameters into ranges using samples wherein these ranges are used for detection of cancer in a region or segment in a digital image. A method for assisting the investigation in detection of cancer in a region in a first digital image of a human body or a human body part using ranges of parameters computed using samples. A method for performing medical diagnostics for detection of cancer over a computer network.
    Type: Application
    Filed: April 24, 2009
    Publication date: October 22, 2009
    Inventors: George Madathilparambil George, Sanjeev Saxena
  • Publication number: 20090260050
    Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by adding a device capable of user authentication that will enable or disable protection for applications as required. The device supports one or more users, none or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges for processes running in that Application Security Environment while that Application Security Environment is in that state.
    Type: Application
    Filed: April 14, 2008
    Publication date: October 15, 2009
    Inventors: George Madathilparambil George, Nikhil George
  • Publication number: 20090249435
    Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by adding a device that will enable or disable protection for applications as required. The device supports one or more users, one or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges for processes running in that Application Security Environment while that Application Security Environment is in that state.
    Type: Application
    Filed: March 27, 2008
    Publication date: October 1, 2009
    Inventors: George Madathilparambil George, Nikhil George
  • Patent number: 7523281
    Abstract: Data protection is weak with the methods currently available and there are risks of corrupting important data, including system data accidentally by users or by malicious programs. We are proposing a method for improving access protection, more particularly, protection for data on mass memories by adding a hardware that will enable or disable read or write protection to portions of mass memories for each user. The hardware supports one or more users and two or more states for each supported user. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to a user corresponds to disabling or enabling read or write protection to some portions of a mass memory or mass memories for that user.
    Type: Grant
    Filed: September 6, 2006
    Date of Patent: April 21, 2009
    Inventors: George Madathilparambil George, Nikhil George
  • Publication number: 20080126649
    Abstract: We are proposing a low latency mechanism for asynchronously running a code segment on a processor in a remote computer by transmitting a special network packet or datalink frame that causes a hardware interrupt. Preferably, the mechanism for invoking the interrupt uses MSI or MSI-X. The information required for interrupting a processor in a remote system is sent in a special network packet or datalink frame.
    Type: Application
    Filed: September 15, 2006
    Publication date: May 29, 2008
    Inventor: George Madathilparambil George
  • Publication number: 20080066183
    Abstract: Data protection is weak with the methods currently available and there are risks of corrupting important data, including system data accidentally by users or by malicious programs. We are proposing a method for improving access protection, more particularly, protection for data on mass memories by adding a hardware that will enable or disable read or write protection to portions of mass memories for each user. The hardware supports one or more users and two or more states for each supported user. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to a user corresponds to disabling or enabling read or write protection to some portions of a mass memory or mass memories for that user.
    Type: Application
    Filed: September 12, 2006
    Publication date: March 13, 2008
    Inventors: George Madathilparambil George, Nikhil George
  • Publication number: 20080059740
    Abstract: Data protection is weak with the methods currently available and there are risks of corrupting important data, including system data accidentally by users or by malicious programs. We are proposing a method for improving access protection, more particularly, protection for data on mass memories by adding a hardware that will enable or disable read or write protection to portions of mass memories for each user. The hardware supports one or more users and two or more states for each supported user. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to a user corresponds to disabling or enabling read or write protection to some portions of a mass memory or mass memories for that user.
    Type: Application
    Filed: September 5, 2006
    Publication date: March 6, 2008
    Inventors: George Madathilparambil George, Nikhil George
  • Publication number: 20080059742
    Abstract: Data protection is weak with the methods currently available and there are risks of corrupting important data, including system data accidentally by users or by malicious programs. We are proposing a method for improving access protection, more particularly, protection for data on mass memories by adding a hardware that will enable or disable read or write protection to portions of mass memories for each user. The hardware supports one or more users and two or more states for each supported user. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to a user corresponds to disabling or enabling read or write protection to some portions of a mass memory or mass memories for that user.
    Type: Application
    Filed: September 6, 2006
    Publication date: March 6, 2008
    Inventors: George Madathilparambil George, Nikhil George
  • Publication number: 20080043737
    Abstract: Datalink frames or networking packets contain protocol information in the header and optionally in the trailer of a frame or a packet. We are proposing a method in which part of or all of the protocol information corresponding to a frame or a packet is transmitted separately in another datalink frame. The “Separately Transmitted Protocol Information” is referred to as STPI. The STPI contains enough protocol information to identify the next hop node or port. STPI can be used avoid network congestion and improve link efficiency. Preferably, there will be one datalink frame or network packet corresponding to each STPI, containing the data and the rest of the protocol information and this frame/packet is referred to as DFoNP. The creation of STPI and DFoNP is done by the originator of the frame or packet such as an operating system.
    Type: Application
    Filed: August 18, 2006
    Publication date: February 21, 2008
    Inventors: George Madathilparambil George, Susan George, Mammen Thomas