Patents by Inventor Ivan Dimitrov
Ivan Dimitrov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240132298Abstract: Conveyor system, for instance for conveying goods, packages and the like including at least two wired motor-roller controllers, each wired motor-roller controller having at least one motor-roller control port and at least one wired signal bus port, at least two wireless motor-roller controllers, each wireless motor-roller controller having at least one motor-roller control port and a wireless port, and the two wired motor-roller controllers being connected in series along the signal bus via the signal bus port, characterized in that at each wired motor-roller controller senses a signal strength of wireless signals of the wireless motor-roller controllers, and the wired motor-roller controllers exchange information about the sensed signal strengths.Type: ApplicationFiled: January 2, 2024Publication date: April 25, 2024Applicants: Kyowa Europe GmbH, Industrial SoftwareInventors: Dimitar Ivanov Petrov, Nikola Aleksandrov Yankov, Dimitar Hristov Suvandzhiev, Ivan Dimitrov Petrov, Kazuya Ichieda, Randy Combs, Georg Malina
-
Publication number: 20240043223Abstract: Conveyor system, for instance for conveying goods, packages and the like including at least two wired motor-roller controllers, wherein each wired motor-roller controller has at least one motor-roller control port and at least one wired signal bus port, at least two wireless motor-roller controllers, wherein each wireless motor-roller controller has at least on motor-roller control port and a wireless port, and wherein the two wired motor-roller controllers are connected in series along the signal bus via the signal bus port, wherein at each wired motor-roller controller senses a signal strength of wireless signals of the wireless motor-roller controllers, and the wired motor-roller controllers exchange information about the sensed signal strengths.Type: ApplicationFiled: October 12, 2023Publication date: February 8, 2024Applicants: Kyowa Europe GmbH, Industrial SoftwareInventors: Dimitar Ivanov Petrov, Nikola Aleksandrov Yankov, Dimitar Hristov Suvandzhiev, Ivan Dimitrov Petrov, Kazuya Ichieda, Randy Combs, Georg Malina
-
Publication number: 20230391556Abstract: A motor-driven conveyor-roller controller for conveyor installations for conveying containers. The controller incudes a power inlet, a wired I/O port, and a wired motor roller port. The controller is configured to output motor roller control signals for a motor roller at the motor roller port. The controller is configured to receive motor roller status signals from the motor roller at the motor roller port and to receive motor roller control signals for the motor roller at the I/O port. The wired I/O port is configured to exchange control information with a central control center. The controller includes a wireless configuration port that is configured to wirelessly receive, from a mobile device, at least configuration signals for the motor roller and/or send status signals representing motor roller status information.Type: ApplicationFiled: August 14, 2023Publication date: December 7, 2023Applicants: Kyowa Europe GmbH, Industrial SoftwareInventors: Dimitar Ivanov Petrov, Nikola Aleksandrov Yankov, Dimitar Hristov Suvandzhiev, Ivan Dimitrov Petrov, Kazuya Ichieda, Randy Combs, Georg Malina
-
Publication number: 20230370418Abstract: Techniques for implementing a last known good (LKG) client-side cache for DNS resiliency are disclosed. A first DNS request is submitted to a DNS server. A first DNS resolution that resolves an IP address for a domain name is received. A service stores the first DNS resolution in an LKG cache residing on the local host. A second DNS request is sent, where the second DNS request again requests to resolve the same domain name. In response to determining that a second DNS resolution for the second DNS request has not been received, the service obtains the IP address for the domain name from the LKG cache.Type: ApplicationFiled: May 12, 2022Publication date: November 16, 2023Inventors: Vinothkumar PRABHAKARAN, Srikanth SUBRAMANIAN, Kiran Kumar Venkata Purna Chenna Kesava VEMULA, Arpan Kumar GUPTA, Aditya SHARMA, Peter Alan CARLIN, Ivan Dimitrov PASHOV
-
Publication number: 20230236955Abstract: A computing device may access a target code for implementing an application. The device may identify addresses for one or more functions or one or more variables associated with the target code. The device may generate an interval tree comprising a root node and one or more function nodes. The device may in response to the target code invoking a function or variable: generate an intercept function configured to intercept communication between the target code and a call address for the at least one of the one or more functions or the one or more variables invoked by the target code. The device may intercept data communicated between the target code and the call address. The device may store the intercepted data as a function node in the interval tree. The device may transmit the interval tree to a user device.Type: ApplicationFiled: January 20, 2023Publication date: July 27, 2023Applicant: Oracle International CorporationInventors: Fuheng Wu, Ivan Dimitrov Davchev, Jun Qian
-
Publication number: 20230114651Abstract: A method, including capturing, at a first time from an executing web-based application including browser-executable code, a first request including a first Uniform Resource Locator (URL) for a specified resource hosted by a first server, and conveying the request to the first server. Upon receiving, from the first server, the requested resource in response to the conveyed request, the received resource is stored to a second server referenced by a second URL different from the first URL. While executing the application at a second time subsequent to the first time, a second request for the specified resource is detected in the code. While the application is executing at the second time, the code is modified so as to reference the second URL, and the modified code is executed so as to convey the second request to the second URL.Type: ApplicationFiled: October 4, 2022Publication date: April 13, 2023Inventors: Aaron Bar Hakim, Ofir Rabanian, Ben Sterenson, Shahar Evron, Ivan Dimitrov, Gonen Tiberg, Gilad Avidan, Yehonatan Ernest Friedman, Kyle Charles Ness, Daniel Elero, Itamar Goldberger, Avraham Levi
-
Publication number: 20230116021Abstract: Methods, storage systems and computer program products implement embodiments of the present invention that include running by a web browser, a web-based application including a set of web pages, and identifying changes in the web pages rendered by the web browser while running the web-based application. For each identified change, a corresponding state of the web-based application is recorded, wherein the corresponding state includes browser-executable code for a given web page being rendered, and one or more transitions from the corresponding state to one or more other states is also recorded. The recorded states and the recorded transitions are compiled into a state machine model of the web-based application, and a demonstration of the application is generated using the state machine model.Type: ApplicationFiled: September 21, 2022Publication date: April 13, 2023Inventors: Aaron Bar Hakim, Gilad Avidan, Ivan Dimitrov, Avraham Levi, Gonen Tiberg, Yehonatan Ernest Friedman
-
Publication number: 20230068635Abstract: A front-end computing system provides cross machine message forwarding through a kernel mode component. The message is received in a kernel mode queue of the front-end computing system. The message includes one or more headers and an entity body including one or more data blocks. A user mode router in the front-end computing system designates a computing system to process the message based at least in part on the one or more headers. The one or more data blocks are passed through the kernel mode queue in the front-end computing system to the designated computing system without passing the one or more data blocks to the user mode router in the front-end computing system.Type: ApplicationFiled: August 30, 2021Publication date: March 2, 2023Inventor: Ivan Dimitrov PASHOV
-
Publication number: 20220197666Abstract: A computing system delegates a request between a first container in user mode of an operating system on a webserver system and a second container in the user mode of the operating system. The operating system includes a kernel. A service in the second container creates a delegation queue in the kernel of the operating system. The service adds an identifier as a property of the delegation queue in the kernel, wherein the identifier is unique across the first container and the second container. A router executing in the first container opens the delegation queue in the kernel using the identifier, responsive to the adding operation. The request is delegated to the service executing in the second container via the delegation queue in the kernel, responsive to the opening operation.Type: ApplicationFiled: February 18, 2021Publication date: June 23, 2022Inventor: Ivan Dimitrov PASHOV
-
Publication number: 20220155395Abstract: First k-space data are received for a MRI examination of a subject in a first field of view (FOV), and second k-space data are received for a second field of view that is adjacent to or overlaps the first field of view. Alternatively, second k-space data, comprising phase and/or slice oversampling k-space data of the first field of view are retrieved from a non-transitory data storage medium. The first k-space data are reconstructed by using at least a portion of the second k-space data as phase and/or slice oversampling to generate a first extended image of a first extended field of view that encompasses the first field of view and extends into the second field of view. The first extended image is cropped to the first field of view to generate an image of the first field of view for the first MRI examination.Type: ApplicationFiled: February 5, 2020Publication date: May 19, 2022Inventors: BRIAN DAVID JOHNSON, IVAN DIMITROV, SANDEEP K. GANJI
-
Patent number: 10855725Abstract: A host operating system running on a computing device monitors network communications for the computing device to identify network resources that are requested by the computing device. The host operating system compares requested network resources against security policies to determine if the requested network resources are trusted. When an untrusted network resource is identified, the host operating system accesses the untrusted network resource within a container that is isolated from the host operating system kernel using techniques discussed herein. By restricting access to untrusted network resources to isolated containers, the host operating system is protected from even kernel-level attacks or infections that may result from an untrusted network resource.Type: GrantFiled: June 2, 2016Date of Patent: December 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Navin Narayan Pai, Charles G. Jeffries, Giridhar Viswanathan, Benjamin M. Schultz, Frederick J. Smith, Lars Reuther, Michael B. Ebersol, Gerardo Diaz Cuellar, Ivan Dimitrov Pashov, Poornananda R. Gaddehosur, Hari R. Pulapaka, Vikram Mangalore Rao
-
Patent number: 10794979Abstract: The invention provides for a magnetic resonance imaging system (100, 300) comprising: a radio-frequency system (116, 122, 124, 126, 126?, 126?, 126??) for acquiring magnetic resonance data (152) from an imaging zone (108), wherein the radio-frequency system comprises multiple antenna elements (126, 126?, 126?, 126??); a memory (140) containing machine executable instructions (170) and pulse sequence commands (150), wherein the pulse sequence commands cause the processor to acquire magnetic resonance data from the multiple antenna elements according to a SENSE protocol; and a processor.Type: GrantFiled: November 8, 2016Date of Patent: October 6, 2020Assignee: Koninklijke Philips N.V.Inventors: Peter Boernert, Miha Fuderer, Ivan Dimitrov
-
Patent number: 10761166Abstract: A guide map is created for use in placing a spectroscopic single voxel in a region of interest in single voxel magnetic resonance spectroscopy. An anatomical planning image of the region of interest is obtained through MRI. As a spectroscopy voxel is stepped across the region of interest, characteristics of the magnetic field used in the MRI are measured at each location of the imaging voxel, and a guide-FWHM map indicative of the homogeneity/inhomogeneity of the magnetic field over the region of interest is derived using the measurements. The guide map is created by overlaying the guide-FWHM map on the anatomical planning image. A spectroscopic single voxel of a size corresponding to that of the spectroscopy voxel is placed within the region of interest as per the guide map. Then spectral data is acquired from the region of interest confined to the single voxel.Type: GrantFiled: September 11, 2015Date of Patent: September 1, 2020Assignee: Koninklijke Philips N.V.Inventor: Ivan Dimitrov
-
Patent number: 10666655Abstract: Providing access control by a first operating system. A method includes receiving at the first operating system, from the second operating system, a request for a bounding reference to a set having at least one resource. A bounding reference for the set is obtained. The bounding reference comprises a reference created from a first operating system resolvable reference to the set. The method further includes providing the obtained bounding reference for the obtained provided bounding reference to the second operating system. A request, including the obtained bounding reference and an identifier identifying the second operating system for the set, is received from the second operating system. The obtained bounding reference and the identifier identifying the second operating system are evaluated. As a result of evaluating the obtained bounding reference and the identifier identifying the second operating system, a resource control action is performed.Type: GrantFiled: November 20, 2017Date of Patent: May 26, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Gerardo Diaz Cuellar, Navin Narayan Pai, Ivan Dimitrov Pashov, Giridhar Viswanathan, Benjamin M. Schultz, Hari R. Pulapaka
-
Patent number: 10659466Abstract: The techniques and systems described herein improve security and improve connection reliability by providing a framework for an application to communicate its intent to an authority service so that the authority service can enforce networking security requirements. In various examples, an intent to access a resource over a network is received and queries are sent to resolve a network connection that enables access to the resource. Information for the resource is then collected and stored together in a trusted and secure environment. For instance, the information can include proxy data or can include hostname data. A ticket can be created based on the information. The ticket can be used to establish and maintain a secure network connection to the resource.Type: GrantFiled: August 12, 2016Date of Patent: May 19, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Gerardo Diaz-Cuellar, Benjamin M. Schultz, Ivan Dimitrov Pashov
-
Patent number: 10438019Abstract: A second operating system accessing resources from an external service. A method includes sending an anonymized request, for an anonymized user corresponding to an authorized user, for resources, through a broker. A request for proof indicating that the anonymized user is authorized to obtain the resources is received from the broker. As a result, a request is send to a first operating system for the proof that the anonymized user is authorized to obtain the resources. Proof is received from the first operating system, based on the anonymized user being associated with the authorized user, that the anonymized user is authorized to obtain the resources. The proof is provided to the broker. As a result, the resources are obtained by the second operating system from the service.Type: GrantFiled: June 30, 2017Date of Patent: October 8, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Giridhar Viswanathan, Gerardo Diaz Cuellar, Hari R. Pulapaka, Ivan Dimitrov Pashov, Navin Narayan Pai, Benjamin M. Schultz
-
Patent number: 10408904Abstract: A magnetic resonance imaging (MRI) system (500), the system includes at least one controller (510) which performs a modified rotated slab excitation (mROSE) sequence for volume selection to exclude portions of a subject under exam which are within the scanning volume and outside of a field-of-view (FOV) so as to reduce foldover artifacts which originate from the excluded portions of the subject under exam, where the mROSE sequence performs volume excitation based upon either optimized symmetrical, minimum-phase, or stretched minimum-phase radio-frequency (RF) pulses in a sagittal plane and encodes the scanning volume in a coronal plane. The controller also performs a chemical-shift sequence including a modified DIXON (mDIXON) sequence for substantially uniform fat/water separation within a FOV which lies within the scanning volume; and/or acquires echo information for reconstructing at least a part of an image.Type: GrantFiled: September 2, 2014Date of Patent: September 10, 2019Assignees: Koninklijke Philips N.V., Board of Regents of the University of Texas SystemInventors: Ivan Pedrosa, Ananth Madhuranthakam, Ivan Dimitrov
-
Publication number: 20190158497Abstract: Providing access control by a first operating system. A method includes receiving at the first operating system, from the second operating system, a request for a bounding reference to a set having at least one resource. A bounding reference for the set is obtained. The bounding reference comprises a reference created from a first operating system resolvable reference to the set. The method further includes providing the obtained bounding reference for the obtained provided bounding reference to the second operating system. A request, including the obtained bounding reference and an identifier identifying the second operating system for the set, is received from the second operating system. The obtained bounding reference and the identifier identifying the second operating system are evaluated. As a result of evaluating the obtained bounding reference and the identifier identifying the second operating system, a resource control action is performed.Type: ApplicationFiled: November 20, 2017Publication date: May 23, 2019Inventors: Gerardo DIAZ CUELLAR, Navin Narayan PAI, Ivan Dimitrov PASHOV, Giridhar VISWANATHAN, Benjamin M. SCHULTZ, Hari R. PULAPAKA
-
Publication number: 20180356484Abstract: The invention provides for a magnetic resonance imaging system (100, 300) comprising: a radio-frequency system (116, 122, 124, 126, 126?, 126?, 126??) for acquiring magnetic resonance data (152) from an imaging zone (108), wherein the radio-frequency system comprises multiple antenna elements (126, 126?, 126?, 126??); a memory (140) containing machine executable instructions (170) and pulse sequence commands (150), wherein the pulse sequence commands cause the processor to acquire magnetic resonance data from the multiple antenna elements according to a SENSE protocol; and a processor.Type: ApplicationFiled: November 8, 2016Publication date: December 13, 2018Inventors: PETER BOERNERT, MIHA FUDERER, IVAN DIMITROV
-
Publication number: 20180322307Abstract: A second operating system accessing resources from an external service. A method includes sending an anonymized request, for an anonymized user corresponding to an authorized user, for resources, through a broker. A request for proof indicating that the anonymized user is authorized to obtain the resources is received from the broker. As a result, a request is send to a first operating system for the proof that the anonymized user is authorized to obtain the resources. Proof is received from the first operating system, based on the anonymized user being associated with the authorized user, that the anonymized user is authorized to obtain the resources. The proof is provided to the broker. As a result, the resources are obtained by the second operating system from the service.Type: ApplicationFiled: June 30, 2017Publication date: November 8, 2018Inventors: Giridhar VISWANATHAN, Gerardo DIAZ CUELLAR, Hari R. PULAPAKA, Ivan Dimitrov PASHOV, Navin Narayan PAI, Benjamin M. SCHULTZ