Patents by Inventor Ivan Dimitrov

Ivan Dimitrov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240132298
    Abstract: Conveyor system, for instance for conveying goods, packages and the like including at least two wired motor-roller controllers, each wired motor-roller controller having at least one motor-roller control port and at least one wired signal bus port, at least two wireless motor-roller controllers, each wireless motor-roller controller having at least one motor-roller control port and a wireless port, and the two wired motor-roller controllers being connected in series along the signal bus via the signal bus port, characterized in that at each wired motor-roller controller senses a signal strength of wireless signals of the wireless motor-roller controllers, and the wired motor-roller controllers exchange information about the sensed signal strengths.
    Type: Application
    Filed: January 2, 2024
    Publication date: April 25, 2024
    Applicants: Kyowa Europe GmbH, Industrial Software
    Inventors: Dimitar Ivanov Petrov, Nikola Aleksandrov Yankov, Dimitar Hristov Suvandzhiev, Ivan Dimitrov Petrov, Kazuya Ichieda, Randy Combs, Georg Malina
  • Publication number: 20240043223
    Abstract: Conveyor system, for instance for conveying goods, packages and the like including at least two wired motor-roller controllers, wherein each wired motor-roller controller has at least one motor-roller control port and at least one wired signal bus port, at least two wireless motor-roller controllers, wherein each wireless motor-roller controller has at least on motor-roller control port and a wireless port, and wherein the two wired motor-roller controllers are connected in series along the signal bus via the signal bus port, wherein at each wired motor-roller controller senses a signal strength of wireless signals of the wireless motor-roller controllers, and the wired motor-roller controllers exchange information about the sensed signal strengths.
    Type: Application
    Filed: October 12, 2023
    Publication date: February 8, 2024
    Applicants: Kyowa Europe GmbH, Industrial Software
    Inventors: Dimitar Ivanov Petrov, Nikola Aleksandrov Yankov, Dimitar Hristov Suvandzhiev, Ivan Dimitrov Petrov, Kazuya Ichieda, Randy Combs, Georg Malina
  • Publication number: 20230391556
    Abstract: A motor-driven conveyor-roller controller for conveyor installations for conveying containers. The controller incudes a power inlet, a wired I/O port, and a wired motor roller port. The controller is configured to output motor roller control signals for a motor roller at the motor roller port. The controller is configured to receive motor roller status signals from the motor roller at the motor roller port and to receive motor roller control signals for the motor roller at the I/O port. The wired I/O port is configured to exchange control information with a central control center. The controller includes a wireless configuration port that is configured to wirelessly receive, from a mobile device, at least configuration signals for the motor roller and/or send status signals representing motor roller status information.
    Type: Application
    Filed: August 14, 2023
    Publication date: December 7, 2023
    Applicants: Kyowa Europe GmbH, Industrial Software
    Inventors: Dimitar Ivanov Petrov, Nikola Aleksandrov Yankov, Dimitar Hristov Suvandzhiev, Ivan Dimitrov Petrov, Kazuya Ichieda, Randy Combs, Georg Malina
  • Publication number: 20230370418
    Abstract: Techniques for implementing a last known good (LKG) client-side cache for DNS resiliency are disclosed. A first DNS request is submitted to a DNS server. A first DNS resolution that resolves an IP address for a domain name is received. A service stores the first DNS resolution in an LKG cache residing on the local host. A second DNS request is sent, where the second DNS request again requests to resolve the same domain name. In response to determining that a second DNS resolution for the second DNS request has not been received, the service obtains the IP address for the domain name from the LKG cache.
    Type: Application
    Filed: May 12, 2022
    Publication date: November 16, 2023
    Inventors: Vinothkumar PRABHAKARAN, Srikanth SUBRAMANIAN, Kiran Kumar Venkata Purna Chenna Kesava VEMULA, Arpan Kumar GUPTA, Aditya SHARMA, Peter Alan CARLIN, Ivan Dimitrov PASHOV
  • Publication number: 20230236955
    Abstract: A computing device may access a target code for implementing an application. The device may identify addresses for one or more functions or one or more variables associated with the target code. The device may generate an interval tree comprising a root node and one or more function nodes. The device may in response to the target code invoking a function or variable: generate an intercept function configured to intercept communication between the target code and a call address for the at least one of the one or more functions or the one or more variables invoked by the target code. The device may intercept data communicated between the target code and the call address. The device may store the intercepted data as a function node in the interval tree. The device may transmit the interval tree to a user device.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 27, 2023
    Applicant: Oracle International Corporation
    Inventors: Fuheng Wu, Ivan Dimitrov Davchev, Jun Qian
  • Publication number: 20230114651
    Abstract: A method, including capturing, at a first time from an executing web-based application including browser-executable code, a first request including a first Uniform Resource Locator (URL) for a specified resource hosted by a first server, and conveying the request to the first server. Upon receiving, from the first server, the requested resource in response to the conveyed request, the received resource is stored to a second server referenced by a second URL different from the first URL. While executing the application at a second time subsequent to the first time, a second request for the specified resource is detected in the code. While the application is executing at the second time, the code is modified so as to reference the second URL, and the modified code is executed so as to convey the second request to the second URL.
    Type: Application
    Filed: October 4, 2022
    Publication date: April 13, 2023
    Inventors: Aaron Bar Hakim, Ofir Rabanian, Ben Sterenson, Shahar Evron, Ivan Dimitrov, Gonen Tiberg, Gilad Avidan, Yehonatan Ernest Friedman, Kyle Charles Ness, Daniel Elero, Itamar Goldberger, Avraham Levi
  • Publication number: 20230116021
    Abstract: Methods, storage systems and computer program products implement embodiments of the present invention that include running by a web browser, a web-based application including a set of web pages, and identifying changes in the web pages rendered by the web browser while running the web-based application. For each identified change, a corresponding state of the web-based application is recorded, wherein the corresponding state includes browser-executable code for a given web page being rendered, and one or more transitions from the corresponding state to one or more other states is also recorded. The recorded states and the recorded transitions are compiled into a state machine model of the web-based application, and a demonstration of the application is generated using the state machine model.
    Type: Application
    Filed: September 21, 2022
    Publication date: April 13, 2023
    Inventors: Aaron Bar Hakim, Gilad Avidan, Ivan Dimitrov, Avraham Levi, Gonen Tiberg, Yehonatan Ernest Friedman
  • Publication number: 20230068635
    Abstract: A front-end computing system provides cross machine message forwarding through a kernel mode component. The message is received in a kernel mode queue of the front-end computing system. The message includes one or more headers and an entity body including one or more data blocks. A user mode router in the front-end computing system designates a computing system to process the message based at least in part on the one or more headers. The one or more data blocks are passed through the kernel mode queue in the front-end computing system to the designated computing system without passing the one or more data blocks to the user mode router in the front-end computing system.
    Type: Application
    Filed: August 30, 2021
    Publication date: March 2, 2023
    Inventor: Ivan Dimitrov PASHOV
  • Publication number: 20220197666
    Abstract: A computing system delegates a request between a first container in user mode of an operating system on a webserver system and a second container in the user mode of the operating system. The operating system includes a kernel. A service in the second container creates a delegation queue in the kernel of the operating system. The service adds an identifier as a property of the delegation queue in the kernel, wherein the identifier is unique across the first container and the second container. A router executing in the first container opens the delegation queue in the kernel using the identifier, responsive to the adding operation. The request is delegated to the service executing in the second container via the delegation queue in the kernel, responsive to the opening operation.
    Type: Application
    Filed: February 18, 2021
    Publication date: June 23, 2022
    Inventor: Ivan Dimitrov PASHOV
  • Publication number: 20220155395
    Abstract: First k-space data are received for a MRI examination of a subject in a first field of view (FOV), and second k-space data are received for a second field of view that is adjacent to or overlaps the first field of view. Alternatively, second k-space data, comprising phase and/or slice oversampling k-space data of the first field of view are retrieved from a non-transitory data storage medium. The first k-space data are reconstructed by using at least a portion of the second k-space data as phase and/or slice oversampling to generate a first extended image of a first extended field of view that encompasses the first field of view and extends into the second field of view. The first extended image is cropped to the first field of view to generate an image of the first field of view for the first MRI examination.
    Type: Application
    Filed: February 5, 2020
    Publication date: May 19, 2022
    Inventors: BRIAN DAVID JOHNSON, IVAN DIMITROV, SANDEEP K. GANJI
  • Patent number: 10855725
    Abstract: A host operating system running on a computing device monitors network communications for the computing device to identify network resources that are requested by the computing device. The host operating system compares requested network resources against security policies to determine if the requested network resources are trusted. When an untrusted network resource is identified, the host operating system accesses the untrusted network resource within a container that is isolated from the host operating system kernel using techniques discussed herein. By restricting access to untrusted network resources to isolated containers, the host operating system is protected from even kernel-level attacks or infections that may result from an untrusted network resource.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: December 1, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Navin Narayan Pai, Charles G. Jeffries, Giridhar Viswanathan, Benjamin M. Schultz, Frederick J. Smith, Lars Reuther, Michael B. Ebersol, Gerardo Diaz Cuellar, Ivan Dimitrov Pashov, Poornananda R. Gaddehosur, Hari R. Pulapaka, Vikram Mangalore Rao
  • Patent number: 10794979
    Abstract: The invention provides for a magnetic resonance imaging system (100, 300) comprising: a radio-frequency system (116, 122, 124, 126, 126?, 126?, 126??) for acquiring magnetic resonance data (152) from an imaging zone (108), wherein the radio-frequency system comprises multiple antenna elements (126, 126?, 126?, 126??); a memory (140) containing machine executable instructions (170) and pulse sequence commands (150), wherein the pulse sequence commands cause the processor to acquire magnetic resonance data from the multiple antenna elements according to a SENSE protocol; and a processor.
    Type: Grant
    Filed: November 8, 2016
    Date of Patent: October 6, 2020
    Assignee: Koninklijke Philips N.V.
    Inventors: Peter Boernert, Miha Fuderer, Ivan Dimitrov
  • Patent number: 10761166
    Abstract: A guide map is created for use in placing a spectroscopic single voxel in a region of interest in single voxel magnetic resonance spectroscopy. An anatomical planning image of the region of interest is obtained through MRI. As a spectroscopy voxel is stepped across the region of interest, characteristics of the magnetic field used in the MRI are measured at each location of the imaging voxel, and a guide-FWHM map indicative of the homogeneity/inhomogeneity of the magnetic field over the region of interest is derived using the measurements. The guide map is created by overlaying the guide-FWHM map on the anatomical planning image. A spectroscopic single voxel of a size corresponding to that of the spectroscopy voxel is placed within the region of interest as per the guide map. Then spectral data is acquired from the region of interest confined to the single voxel.
    Type: Grant
    Filed: September 11, 2015
    Date of Patent: September 1, 2020
    Assignee: Koninklijke Philips N.V.
    Inventor: Ivan Dimitrov
  • Patent number: 10666655
    Abstract: Providing access control by a first operating system. A method includes receiving at the first operating system, from the second operating system, a request for a bounding reference to a set having at least one resource. A bounding reference for the set is obtained. The bounding reference comprises a reference created from a first operating system resolvable reference to the set. The method further includes providing the obtained bounding reference for the obtained provided bounding reference to the second operating system. A request, including the obtained bounding reference and an identifier identifying the second operating system for the set, is received from the second operating system. The obtained bounding reference and the identifier identifying the second operating system are evaluated. As a result of evaluating the obtained bounding reference and the identifier identifying the second operating system, a resource control action is performed.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: May 26, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gerardo Diaz Cuellar, Navin Narayan Pai, Ivan Dimitrov Pashov, Giridhar Viswanathan, Benjamin M. Schultz, Hari R. Pulapaka
  • Patent number: 10659466
    Abstract: The techniques and systems described herein improve security and improve connection reliability by providing a framework for an application to communicate its intent to an authority service so that the authority service can enforce networking security requirements. In various examples, an intent to access a resource over a network is received and queries are sent to resolve a network connection that enables access to the resource. Information for the resource is then collected and stored together in a trusted and secure environment. For instance, the information can include proxy data or can include hostname data. A ticket can be created based on the information. The ticket can be used to establish and maintain a secure network connection to the resource.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: May 19, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gerardo Diaz-Cuellar, Benjamin M. Schultz, Ivan Dimitrov Pashov
  • Patent number: 10438019
    Abstract: A second operating system accessing resources from an external service. A method includes sending an anonymized request, for an anonymized user corresponding to an authorized user, for resources, through a broker. A request for proof indicating that the anonymized user is authorized to obtain the resources is received from the broker. As a result, a request is send to a first operating system for the proof that the anonymized user is authorized to obtain the resources. Proof is received from the first operating system, based on the anonymized user being associated with the authorized user, that the anonymized user is authorized to obtain the resources. The proof is provided to the broker. As a result, the resources are obtained by the second operating system from the service.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: October 8, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Giridhar Viswanathan, Gerardo Diaz Cuellar, Hari R. Pulapaka, Ivan Dimitrov Pashov, Navin Narayan Pai, Benjamin M. Schultz
  • Patent number: 10408904
    Abstract: A magnetic resonance imaging (MRI) system (500), the system includes at least one controller (510) which performs a modified rotated slab excitation (mROSE) sequence for volume selection to exclude portions of a subject under exam which are within the scanning volume and outside of a field-of-view (FOV) so as to reduce foldover artifacts which originate from the excluded portions of the subject under exam, where the mROSE sequence performs volume excitation based upon either optimized symmetrical, minimum-phase, or stretched minimum-phase radio-frequency (RF) pulses in a sagittal plane and encodes the scanning volume in a coronal plane. The controller also performs a chemical-shift sequence including a modified DIXON (mDIXON) sequence for substantially uniform fat/water separation within a FOV which lies within the scanning volume; and/or acquires echo information for reconstructing at least a part of an image.
    Type: Grant
    Filed: September 2, 2014
    Date of Patent: September 10, 2019
    Assignees: Koninklijke Philips N.V., Board of Regents of the University of Texas System
    Inventors: Ivan Pedrosa, Ananth Madhuranthakam, Ivan Dimitrov
  • Publication number: 20190158497
    Abstract: Providing access control by a first operating system. A method includes receiving at the first operating system, from the second operating system, a request for a bounding reference to a set having at least one resource. A bounding reference for the set is obtained. The bounding reference comprises a reference created from a first operating system resolvable reference to the set. The method further includes providing the obtained bounding reference for the obtained provided bounding reference to the second operating system. A request, including the obtained bounding reference and an identifier identifying the second operating system for the set, is received from the second operating system. The obtained bounding reference and the identifier identifying the second operating system are evaluated. As a result of evaluating the obtained bounding reference and the identifier identifying the second operating system, a resource control action is performed.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Gerardo DIAZ CUELLAR, Navin Narayan PAI, Ivan Dimitrov PASHOV, Giridhar VISWANATHAN, Benjamin M. SCHULTZ, Hari R. PULAPAKA
  • Publication number: 20180356484
    Abstract: The invention provides for a magnetic resonance imaging system (100, 300) comprising: a radio-frequency system (116, 122, 124, 126, 126?, 126?, 126??) for acquiring magnetic resonance data (152) from an imaging zone (108), wherein the radio-frequency system comprises multiple antenna elements (126, 126?, 126?, 126??); a memory (140) containing machine executable instructions (170) and pulse sequence commands (150), wherein the pulse sequence commands cause the processor to acquire magnetic resonance data from the multiple antenna elements according to a SENSE protocol; and a processor.
    Type: Application
    Filed: November 8, 2016
    Publication date: December 13, 2018
    Inventors: PETER BOERNERT, MIHA FUDERER, IVAN DIMITROV
  • Publication number: 20180322307
    Abstract: A second operating system accessing resources from an external service. A method includes sending an anonymized request, for an anonymized user corresponding to an authorized user, for resources, through a broker. A request for proof indicating that the anonymized user is authorized to obtain the resources is received from the broker. As a result, a request is send to a first operating system for the proof that the anonymized user is authorized to obtain the resources. Proof is received from the first operating system, based on the anonymized user being associated with the authorized user, that the anonymized user is authorized to obtain the resources. The proof is provided to the broker. As a result, the resources are obtained by the second operating system from the service.
    Type: Application
    Filed: June 30, 2017
    Publication date: November 8, 2018
    Inventors: Giridhar VISWANATHAN, Gerardo DIAZ CUELLAR, Hari R. PULAPAKA, Ivan Dimitrov PASHOV, Navin Narayan PAI, Benjamin M. SCHULTZ