Patents by Inventor Ketan Shah

Ketan Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10949676
    Abstract: An aerial monitoring system and method for identification and location of object features is disclosed. The aerial monitoring system and method includes training an image processing engine to identify predefined object features in images. Training involves the image processing engine generating a model for identifying predefined object features in images. Identifying the predefined object features includes using a drone outfitted with a drone camera to capture and geotag monitoring images of target objects. The monitoring images are both infrared and non-infrared. The image processing engine applies the model to the monitoring images to determine whether the monitoring images include object features that fit within one of multiple categories. The image processing engine uses a fuzzy clustering process to group objects into cluster locations. The image processing system outputs the identification and location of the object features. The output is used for maintenance planning related to the objects.
    Type: Grant
    Filed: April 9, 2018
    Date of Patent: March 16, 2021
    Assignee: Accenture Global Solutions Limited
    Inventors: Ketan Shah, Chandan Kumar, Sanjay Rawat
  • Patent number: 10925196
    Abstract: The description relates to devices, such as computing devices that can include dimensionally-constrained shielded circuit board assemblies. One example can include a circuit board that includes an upwardly extending fence. The example can also include a heat generating component positioned within the fence and a thermal module defining a major planar surface positioned over the heat generating component. The thermal module can include a downwardly extending frame that overlaps with the fence. The gasket can be compressed between the fence and the frame in a direction parallel to the major planar surface.
    Type: Grant
    Filed: August 9, 2019
    Date of Patent: February 16, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Todd David Pleake, John Terpsma, Ketan Shah, David Carter Vandervoort, Keith Walter Kaatz
  • Publication number: 20210045264
    Abstract: The description relates to devices, such as computing devices that can include dimensionally-constrained shielded circuit board assemblies. One example can include a circuit board that includes an upwardly extending fence. The example can also include a heat generating component positioned within the fence and a thermal module defining a major planar surface positioned over the heat generating component. The thermal module can include a downwardly extending frame that overlaps with the fence. The gasket can be compressed between the fence and the frame in a direction parallel to the major planar surface.
    Type: Application
    Filed: August 9, 2019
    Publication date: February 11, 2021
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Todd David Pleake, John Terpsma, Ketan Shah, David Carter Vandervoort, Keith Walter Kaatz
  • Publication number: 20190354874
    Abstract: Embodiments herein disclose a computerized method for goal-driven conversation. The method includes training a conversation agent using a conversation catalog and receiving configurations for the conversation agent. The configurations include task configurations, a goal plan, and event conditions. Further, the method includes receiving by the conversation agent input from a user. Further, the method includes checking a system for inputs for given user input. Further, the method includes processing the input through one or more stages from the group. The stages include objective analysis to analyze to identify objective of the input, event analysis to evaluate event conditions and check for goal triggers for matching event conditions, and goal analysis to determine next conversation based on the goal plan. Further, the method includes making conversational interaction with the user based on analysis.
    Type: Application
    Filed: May 16, 2019
    Publication date: November 21, 2019
    Applicant: Agentz, Inc
    Inventors: Ketan Shah, Arunkumar Sivakumar
  • Patent number: 10464244
    Abstract: An improved injection mold for forming an injection molded component. The injection mold includes a main cavity block and a main core block that are moveable with respect to one another. The main cavity block has a cavity block mating face that includes a first mold surface and the main core block has a core block mating face that includes a second mold surface. A plurality of induction heating coils extend within the main cavity block and a plurality of gas inlet channels extend through the main core block. The second mold surface includes a plurality ridges that cooperatively form a continuous gas flow path that is disposed in fluid communication with the plurality of as inlet channels. The continuous gas flow path follows a serpentine shape to provide even and uninterrupted gas flow across the second mold surface.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: November 5, 2019
    Assignee: FCA US LLC
    Inventors: Daniel Aquilina, Gregory J Finn, Ketan Shah, David V Olar, David E Compeau
  • Publication number: 20190311203
    Abstract: An aerial monitoring system and method for identification and location of object features is disclosed. The aerial monitoring system and method includes training an image processing engine to identify predefined object features in images. Training involves the image processing engine generating a model for identifying predefined object features in images. Identifying the predefined object features includes using a drone outfitted with a drone camera to capture and geotag monitoring images of target objects. The monitoring images are both infrared and non-infrared. The image processing engine applies the model to the monitoring images to determine whether the monitoring images include object features that fit within one of multiple categories. The image processing engine uses a fuzzy clustering process to group objects into cluster locations. The image processing system outputs the identification and location of the object features. The output is used for maintenance planning related to the objects.
    Type: Application
    Filed: April 9, 2018
    Publication date: October 10, 2019
    Inventors: Ketan Shah, Chandan Kumar, Sanjay Rawat
  • Publication number: 20190091060
    Abstract: Maxillary and mandibular appliances can be mounted to a user's upper and lower jaws. The appliances can include a palatal pad, buccal tubes, hamular notch tubes, and an anterior deprogrammer. The various portions of the appliances can provoke beneficial reactions by muscles in the tongue and jaw area, massage the same muscles, or provide other beneficial effects.
    Type: Application
    Filed: September 20, 2018
    Publication date: March 28, 2019
    Inventor: Mamta Ketan Shah
  • Publication number: 20190018399
    Abstract: A telemetry master (TM) system provides automatic monitoring and maintenance of equipment by automatically generating predictive actions of a certain confidence threshold to backend systems which maintain a full duplex communication channel with the TM system. Data entries including context information that are generated by applications corresponding to the backend systems during the functioning of the backend systems are collected, analyzed and actionable items such as alerts, alarms of particular messages cause the telemetry master system to generate a predictive action of a minimum confidence threshold using a pre-trained first data model. A second data model is employed to identify particular equipment from the backend systems that is to implement the action. Results from implementing the action are collected and again used to train the data models. Certain applications can include intelligent agents which enable automatic execution of the actions.
    Type: Application
    Filed: July 11, 2018
    Publication date: January 17, 2019
    Applicant: ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Ketan Shah, Abhijit Ekre, Chandan Kumar, Tanmay Dalal, Anupriya Munjal, Giffy Jerald Chris, Sanjay Rawat, Rajeev S. Kumar, Lukish Rajesh Yadav
  • Publication number: 20180229411
    Abstract: An improved injection mold for forming an injection molded component. The injection mold includes a main cavity block and a main core block that are moveable with respect to one another. The main cavity block has a cavity block mating face that includes a first mold surface and the main core block has a core block mating face that includes a second mold surface. A plurality of induction heating coils extend within the main cavity block and a plurality of gas inlet channels extend through the main core block. The second mold surface includes a plurality ridges that cooperatively form a continuous gas flow path that is disposed in fluid communication with the plurality of as inlet channels. The continuous gas flow path follows a serpentine shape to provide even and uninterrupted gas flow across the second mold surface.
    Type: Application
    Filed: February 15, 2017
    Publication date: August 16, 2018
    Inventors: Daniel Aquilina, Gregory J. Finn, Ketan Shah, David V. Olar, David E. Compeau
  • Publication number: 20180232791
    Abstract: Embodiments herein provide a method and system provide a method and system for guiding users to choose and connect to business and services based on existing search results. The method includes providing a customised list of most suitable/relevant services to the user. Further, the method includes enabling search engines, directories and advertising agencies with guiding user behaviour and connect the user to specific local service to maximise revenue and other benefits as well as better targeting for businesses.
    Type: Application
    Filed: February 15, 2018
    Publication date: August 16, 2018
    Inventor: Ketan Shah
  • Patent number: 9900330
    Abstract: The disclosed computer-implemented method for identifying potentially risky data users within organizations may include (1) monitoring computing activity of a member of an organization with respect to the member's access to data related to the organization, (2) generating, based at least in part on the member's computing activity, a baseline representation of the member's access to the data, (3) detecting at least one attempt by the member to access at least a portion of the data, (4) determining that the member's attempt to access the portion of data represents an anomaly that is suspiciously inconsistent with the baseline representation, and then in response to determining that the member's attempt to access the portion of data represents the anomaly, (5) classifying the member as a potential risk to the security of the data. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: February 20, 2018
    Assignee: Veritas Technologies LLC
    Inventors: Shailesh Dargude, Anand Athavale, Harshit Shah, Ketan Shah
  • Patent number: 9021429
    Abstract: Various embodiments of systems and methods for recommending applications to portable electronic devices are described herein. Initially a context change of an application identification parameter is detected. Based on the detected context change, a target application, from a plurality of applications, may be identified. A similarity value is then computed between the identified target application and another application. Finally, an application to be recommended to a portable electronic device is determined based on the computed similarity value and a rate value of another application.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: April 28, 2015
    Assignee: Sybase Inc.
    Inventors: Anand Agrawal, Dinesh Kumar, Ketan Shah
  • Publication number: 20150106801
    Abstract: Various embodiments of systems and methods for recommending applications to portable electronic devices are described herein. Initially a context change of an application identification parameter is detected. Based on the detected context change, a target application, from a plurality of applications, may be identified. A similarity value is then computed between the identified target application and another application. Finally, an application to be recommended to a portable electronic device is determined based on the computed similarity value and a rate value of another application.
    Type: Application
    Filed: October 16, 2013
    Publication date: April 16, 2015
    Inventors: Anand Agrawal, Dinesh Kumar, Ketan Shah
  • Patent number: 8914412
    Abstract: File management systems and methods are presented. In one embodiment, implementation of a method for determining the accurate ownership of a file within a data system includes: identifying a first plurality of access events for a file, wherein the file is associated with a directory of related files; identifying a second plurality of access events for the related files within the directory, wherein access events in the first and second plurality of access events occur within a period; determining a pool of users accessing files within the directory within the period; and selecting a user from the pool of users as an inferred owner of the file based on access metrics related to the plurality of access events.
    Type: Grant
    Filed: April 7, 2011
    Date of Patent: December 16, 2014
    Assignee: Symantec Corporation
    Inventors: Neha Shirish Deodhar, Jitendra Pore, Ketan Shah
  • Patent number: 8903860
    Abstract: A system and method of identifying a data owner examining a plurality of criterion including access type, number of accesses at a given time and over the period of time selected, recentness of access, and permission levels of users. The method of file owner identification comprises collecting a plurality of samples including usage of a file by a plurality of users. A plurality of factors is calculated based on said plurality of users, wherein a respective factor is calculated for each of said plurality of users, wherein each factor is based on a plurality of use elements. Based on said plurality of factors, a file owner is determined of said file from among said plurality of users. The file owner may be communicated and/or displayed e.g., in a graph.
    Type: Grant
    Filed: March 15, 2010
    Date of Patent: December 2, 2014
    Assignee: Symantec Corporation
    Inventors: Nikhil Marathe, Parag V. Thakur, Ganesh Vasantrao Gaikwad, Mayank Shekhar, Ketan Shah, Sharad Srivastava
  • Publication number: 20120259849
    Abstract: File management systems and methods are presented. In one embodiment, implementation of a method for determining the accurate ownership of a file within a data system includes: identifying a first plurality of access events for a file, wherein the file is associated with a directory of related files; identifying a second plurality of access events for the related files within the directory, wherein access events in the first and second plurality of access events occur within a period; determining a pool of users accessing files within the directory within the period; and selecting a user from the pool of users as an inferred owner of the file based on access metrics related to the plurality of access events.
    Type: Application
    Filed: April 7, 2011
    Publication date: October 11, 2012
    Applicant: SYMANTEC CORPORATION
    Inventors: Neha Shirish Deodhar, Jitendra Pore, Ketan Shah
  • Patent number: 8050261
    Abstract: Embodiments according to the invention relate to frame redirection, which includes methods to intercept and re-route traffic between an initiator and a target. When a frame is redirected, an initiator issues a frame to the target, but the frame is received by a virtual target in a redirection switch by allowing the redirection switch to use the WWN of the actual target. From the perspective of the initiator, the target resides on the redirection switch. From the redirection switch, the frame is sent to the actual target by allowing the redirection switch to use the identity of the initiator. In other words, the redirection switch presents the WWN of the initiator to the target when the redirected frame is sent to the target. From the perspective of the target, the frame is received as if it originated at the initiator.
    Type: Grant
    Filed: June 17, 2008
    Date of Patent: November 1, 2011
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Amr Sabaa, Bao Vu, Tarak Parekh, Lucy Yan, Qingyuan Ma, Ketan Shah, Richard L Hammons
  • Publication number: 20110225199
    Abstract: A system and method of identifying a data owner examining a plurality of criterion including access type, number of accesses at a given time and over the period of time selected, recentness of access, and permission levels of users. The method of file owner identification comprises collecting a plurality of samples including usage of a file by a plurality of users. A plurality of factors is calculated based on said plurality of users, wherein a respective factor is calculated for each of said plurality of users, wherein each factor is based on a plurality of use elements. Based on said plurality of factors, a file owner is determined of said file from among said plurality of users. The file owner may be communicated and/or displayed e.g., in a graph.
    Type: Application
    Filed: March 15, 2010
    Publication date: September 15, 2011
    Applicant: SYMANTEC CORPORATION
    Inventors: Nikhil Marathe, Parag V. Thakur, Ganesh Vasantrao Gaikwad, Mayank Shekhar, Ketan Shah, Sharad Srivastava
  • Patent number: 7925542
    Abstract: The present invention relates to a method and apparatus for connecting wish lists to users, thus making wish lists accessible to such user attributes as buddy lists, or the equivalent. The invention attaches a wish list to an instant messaging name and therefore makes it available to all persons on the user's buddy list. In a further embodiment of the invention, the wish list is attached to an account, such as a wallet. As a result, various conveniences are provided. For example, a member of the user's buddy list can give a gift to the user from the wish list; a group can contribute incrementally to the giving of a gift to the user; an individual can add incremental amounts to his or her wish list to pay for an item on time (as a type of layaway); and relatives and friends can give gifts that they know will be appreciated because the gifts are on the user's wish list.
    Type: Grant
    Filed: October 24, 2008
    Date of Patent: April 12, 2011
    Assignee: AOL Inc.
    Inventor: Ketan Shah
  • Patent number: D921002
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 1, 2021
    Assignee: GOOGLE LLC
    Inventors: Rohan Ketan Shah, Jorim Dorian Jaggi, Arif Huda, Adrian Roos, Michael Adam Cohen