Patents by Inventor Gyan Prakash

Gyan Prakash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10237611
    Abstract: Embodiments of mechanisms for dynamic media content type streaming management for mobile devices are generally described herein. In some embodiments, the mobile device may receive selection input pertaining to generating output from a media file containing at least two of audio data, video data, and closed-captioning data, the selection input selecting at least one of audio, video, and closed-captioning to be output during play of the media content. In some embodiments, the mobile device may generate an audio output as a signal in response to the selection input including audio. In some embodiments, the mobile device may generate a video output as a signal in response to the selection input including video. In some embodiments, the mobile device may generate a closed-captioning output as a signal in response to selection input including closed-captioning.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: March 19, 2019
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Rajesh Poornachandran, Brian J. Hernacki, Kaitlin Murphy, Rita H Wouhaybi
  • Publication number: 20190066740
    Abstract: A system and method for aligning clock signals in a DDR DRAM module is disclosed. The system includes a phase detector circuitry, a controllable delay circuit, a first delay circuit and a synchronizing circuit. A clock signal is simultaneously transmitted through the first delay circuit and the controllable delay circuit. Subsequently, the clock signals transmitted through the first delay circuit and the controllable delay circuit are captured at the output thereof, and fed as inputs to the phase detector circuitry. The phase detector circuitry determines whether the clock signals are in phase, and accordingly adjusts the delay associated with the controllable delay circuit until the two clock signals are determined to be in phase.
    Type: Application
    Filed: June 30, 2016
    Publication date: February 28, 2019
    Applicant: INVECAS TECHNOLOGIES PVT. LTD.
    Inventors: GYAN PRAKASH, NIDHIR KUMAR, MUNISWARA REDDY VORUGU
  • Patent number: 10178164
    Abstract: Techniques for securely binding a software application to a communication device may include sending a set of device identifiers associated with the computing device to a server, receiving a server-generated dynamic device identifier that is generated based on the set of device identifiers; and storing the server-generated dynamic device identifier during initialization of the application. During runtime execution of the application, the application may receive a request to execute an application specific task.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: January 8, 2019
    Assignee: Visa International Service Association
    Inventors: Gyan Prakash, Selim Aissi, Rasta Mansour, Ajit Gaddam
  • Publication number: 20190004564
    Abstract: A method and system for cycle accurate data transfer between skewed source synchronous clocks is envisaged. The procedure starts through reset. On reset, both the write and read address registers are set to point to location 0. Source clock is stopped to disable active clock edges to both write and read address registers during the reset procedure. The source clock is subsequently started to deliver active edges w both write and read address registers. On every active source clock edge, data is pushed into the data register based on the location pointed by write address resister. On every skewed active clock edge, data is read from the data register based on the address pointed by read address register. Due to the delayed nature of clock reaching the read address register, write address register increments first and stores data into the data register.
    Type: Application
    Filed: June 14, 2016
    Publication date: January 3, 2019
    Inventors: GYAN PRAKASH, NIDHIR KUMAR
  • Publication number: 20180357002
    Abstract: A method for automatic calibration of read latency of a memory module is envisaged. The read latency is initially set to a default maximum value. The default maximum value is equivalent to the number of clock cycles required to complete a data read operation. A data pattern to be read from the memory module in consideration of the default maximum value is identified. A memory read operation is preformed, and a first data pattern is captured, in accordance with the default maximum value. The identified data pattern is compared with the first data pattern, and the default maximum value is iteratively calibrated based on the comparison thereof. Aforementioned steps are repeated across a plurality of memory read operations, and variations ire the maximum default value are tracked, and an average maximum value is calculated based thereupon. The average maximum value is assigned as the read latency for the memory module.
    Type: Application
    Filed: June 13, 2016
    Publication date: December 13, 2018
    Inventors: GYAN PRAKASH, NIDHIR KUMAR, CHANDRASHEKAR NARLA
  • Publication number: 20180351537
    Abstract: The present disclosure envisages an asynchronous clock gating circuitry and a method for designing the asynchronous clock gating circuitry. The asynchronous clock gating circuitry could be placed at the very beginning of the clock network, given its design and implementation logic. The asynchronous clock gating circuitry helps meet the timing requirement on the enable pin thereof. The asynchronous clock gating circuitry avoids cumbersome replication of cluck gating circuitry during physical implementation of the (circuit) design, and further helps reduce the power consumption levels in sequential circuits.
    Type: Application
    Filed: June 14, 2016
    Publication date: December 6, 2018
    Inventors: GYAN PRAKASH, NIDHIR KUMAR
  • Publication number: 20180349874
    Abstract: A method for automatically analyzing a personal service session and completing a transaction therefor, includes monitoring a service location with a video camera in communication with a processor, determining that the personal service session has begun based on an identification of at least one start trigger event, analyzing an output from the video camera including a plurality of frames of video data collected during the personal service session to identify a sequence of frames of the video data, automatically matching the sequence of frames to at least one type of service that was provided during the personal service session, determining that the personal service session has ended based on an identification of at least one end trigger event, determining a transaction value associated with the types of service that have been provided during the personal service session, and generating an electronic invoice based on the determined transaction value.
    Type: Application
    Filed: June 2, 2017
    Publication date: December 6, 2018
    Inventors: Di You, Zack Petersen, Gyan Prakash, Sivanarayana Gaddam, Vibhor Kumar, Dean Galland
  • Publication number: 20180330342
    Abstract: Systems and methods related to cryptocurrency system that enables transactions to be performed using digital assets corresponding to an amount of fiat currency. The cryptocurrency system includes a digital asset service provider computer that can host a digital asset account on behalf of an intended recipient of a transfer (e.g., an unbanked user). In some embodiments, a transfer recipient may elect to receive the transfer in the form of a digital asset. The digital asset service provider computer may facilitate a fund transfer by a financial institution to hold currency with which the digital asset is backed. The digital asset may be generated and managed by the digital asset service provider computer as a blockchain ledger of transactions that cryptographically secures data that is stores. In some embodiments, a payment method identifier may be generated for the digital asset and utilized by the transfer recipient to perform subsequent transactions.
    Type: Application
    Filed: May 11, 2017
    Publication date: November 15, 2018
    Inventors: Gyan Prakash, Ajit Gaddam, Sivanarayana Gaddam
  • Patent number: 10069579
    Abstract: Systems and methods may use proximate communication to retrieve information pertaining to a target device. In one example, the method may include detecting the target device within a vicinity of a user device, receiving an information request response communication including information pertaining to the target device, and receiving an operation request response communication including information pertaining to a performed operation.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: September 4, 2018
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Nagasubramanian Gurumoorthy
  • Patent number: 10057369
    Abstract: A request for content is sent via a client device. The client device negotiates with a server content provider regarding the layout of the content using a dynamically configurable content layout profile describing layout preferences for content. When the content is received from the server content provider, the content is displayed according to the dynamically configurable content layout profile. The server may format the content in accordance with the profile and send the formatted content to the client device via a network. A user of the device may modify the profile dynamically to specify a different layout and receive reformatted content.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: August 21, 2018
    Assignee: Intel Corporation
    Inventors: Rajesh Poornachandran, Gyan Prakash
  • Publication number: 20180131509
    Abstract: Systems and methods may provide for online identification and authentication. In one example, the method may include generating a credential to represent a relationship based on a common ground of authenticated communication between a first user and a second user, identifying the second user to the first user, authenticating the relationship of the second user to the first user, and initiating, upon authentication, a communication between the first user and the second user.
    Type: Application
    Filed: August 30, 2017
    Publication date: May 10, 2018
    Inventors: Jesse Walker, Gyan Prakash, David Stanasolovich, James R. Gregg
  • Patent number: 9953165
    Abstract: Generally, this disclosure describes devices, methods and systems and for securely updating software on a mobile platform using trusted hardware based authentication. The device may include an image update module configured to receive a software update image from an update server, the image update module executing at an operating system (OS) level; a critical component database configured to identify critical software components associated with the secure operation of the device; a secure update application module configured to verify the inclusion of the critical software components in the software update image prior to installation of the software update image on the device; and a trusted execution environment (TEE) configured to restrict control access and data access to the secure update application module and the critical component database, the restriction enforced against the OS and against modules executing at the OS level.
    Type: Grant
    Filed: June 13, 2016
    Date of Patent: April 24, 2018
    Assignee: INTEL CORPORATION
    Inventors: Gyan Prakash, Jiphun C. Satapathy
  • Publication number: 20180107828
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Application
    Filed: November 30, 2017
    Publication date: April 19, 2018
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 9948659
    Abstract: An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: April 17, 2018
    Assignee: Intel Corporation
    Inventors: Todd Harple, Gyan Prakash, Saurabh Dadu, Sigal Louchheim
  • Patent number: 9922205
    Abstract: Various systems and methods for managing user information on mobile devices are described herein. A selection of user information is received from a user operating a user device. A privacy setting for the selection of user information is received from the user, the privacy setting to permit or deny access to the user information to a third-party application. The selection of user information and the privacy setting is transmitted from the user device to a receiving device, where the receiving device is configured to enforce the privacy setting for the third-party application executing on the receiving device.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: March 20, 2018
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Rajesh Poornachandran
  • Publication number: 20180075898
    Abstract: A method and system for multi cycle write leveling are disclosed. At least three data patterns are written into consecutive address locations of a memory device via corresponding write operations. Subsequently, predetermined beats of data strobe signals corresponding to certain predetermined write operations are gated. Based at least on the gating of predetermined data beats, a target data pattern to be read from the memory device is determined. Subsequently, a data read operation is performed, and the data written onto a specific address location of the memory device is read there from. The data thus read from the memory device is compared with the target pattern. Based on the comparison of the data read from the memory device with the target pattern, a delay cycle between the data strobe signals and clock signal is determined, and the data strobe signal and clock signal are accordingly calibrated.
    Type: Application
    Filed: February 24, 2016
    Publication date: March 15, 2018
    Inventors: GYAN PRAKASH, NIDHIR KUMAR
  • Patent number: 9898732
    Abstract: Methods and systems may provide for generating a virtual transaction card based on a card value and one or more mobile usage constraints including a time bounded policy, wherein the virtual transaction card is invalid if the time bounded policy is not satisfied. Additionally, the virtual transaction card may be transmitted to a delegate mobile device. Other mobile usage constraints, such as location bounded policies and type of transaction policies may also be used.
    Type: Grant
    Filed: March 31, 2012
    Date of Patent: February 20, 2018
    Assignee: Intel Corporation
    Inventors: Kaitlin A. Murphy, Gyan Prakash
  • Patent number: 9891698
    Abstract: A system may configure at least a low power engine (LPE) and network interface circuitry when transitioning from an active state to a low-power state. The network interface circuitry may be configured to receive information from a network and to store any received information containing audio information into a memory location. The LPE may be configured to monitor the memory location, to retrieve the stored information from the memory location, to generate audio information based on the stored information and to provide the audio information to audio circuitry for playback. It is also possible for the LPE to receive audio information from the audio circuitry, to generate information for transmission based on the audio information and to store the information into a second memory location. The network interface circuitry may then retrieve the stored information from the second memory location and transmit the information to the network.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: February 13, 2018
    Assignee: INTEL CORPORATION
    Inventors: Gyan Prakash, Guru Raj, Nagasubramanian Gurumoorthy, Selim Aissi
  • Patent number: 9887997
    Abstract: Systems and methods for performing web authentication using a client platform root of trust are disclosed herein. Website and user validity and integrity may be authenticated based on the user device's attempt to access the website. A user device may securely access the website once the user device is successfully authenticated with a server. In an embodiment, the user device may perform an authentication of the website to ensure the website is a valid entity.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: February 6, 2018
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Rajesh Poornachandran
  • Patent number: 9870477
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: January 16, 2018
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash