Patents by Inventor Kiran Kumar

Kiran Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220294472
    Abstract: A method and system for decoding low density parity check (“LDPC”) codes. An LDPC code decoder includes LDPC decoding circuitry comprising a Q message generator and a P sum adder array. The Q message generator combines an R message from a previous iteration with a P message to produce a Q message. The P sum adder array adds the P message to a difference of an R message from a current iteration and the R message from the previous iteration to produce an updated P message.
    Type: Application
    Filed: May 13, 2022
    Publication date: September 15, 2022
    Applicant: The Texas A&M University System
    Inventors: Kiran Kumar GUNNAM, Gwan S. CHOI
  • Publication number: 20220287773
    Abstract: A hair cutting device for cutting hair on a body of a subject includes a light source for generating laser light at one or more specific wavelengths corresponding to wavelengths absorbed by one or more chromophores in hair; and a cutting element that has an optical waveguide that is coupled to the light source to receive laser light. A portion of a side wall of the optical waveguide forms a cutting face for contacting hair where, at least at the cutting face, the optical waveguide has a refractive index that is equal to or lower than the refractive index of hair and higher than the refractive index of skin.
    Type: Application
    Filed: June 3, 2022
    Publication date: September 15, 2022
    Inventors: Yannyk Parulian Julian BOURQUIN, Rieko VERHAGEN, Bastiaan Wilhelmus Maria MOESKOPS, Kiran Kumar THUMMA, Joseph Petrus Henricus TER BORCH, Mark Thomas JOHNSON, Arnoldus Johannes Martinus Jozeph RAS, Gerhardus Wilhelmus LUCASSEN, Martinus Bernardus VAN DER MARK
  • Patent number: 11442899
    Abstract: A computing system includes a server. The server is communicatively coupled to a data repository and is configured to store a data in the data repository. The server is further configured to create, via a visual information flow creation tool, at least one information flow object. The server is additionally configured to create, via a retry handling policy system, a retry policy, wherein the retry policy comprises a retry condition and a retry strategy, and to enable the at least one information flow object to follow the retry strategy when the retry condition occurs.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: September 13, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Joshua Timothy Nerius, Venkata Kiran Kumar Koya
  • Patent number: 11444785
    Abstract: Example techniques for establishing trusted communication with container-based services are described. In an example, a digital certificate stored in a memory is injected from the memory into a container. The container is external to the memory. The digital certificate is usable to establish a trusted communication between a service deployed in the container and a software program.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: September 13, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Kiran Kumar Vaddi, Om Kumar, Jaivish Kothari
  • Publication number: 20220280446
    Abstract: The present invention is generally directed to substantially pure cannabidiol, stable cannabinoid pharmaceutical formulations, and methods of their use.
    Type: Application
    Filed: February 18, 2022
    Publication date: September 8, 2022
    Applicant: RADIUS PHARMACEUTICALS, INC.
    Inventors: Kiran Kumar Vangara, Huaguang Li, Ningxin Yan, Hung Q. Nguyen, Venkat R. Goskonda
  • Publication number: 20220286258
    Abstract: Embodiments of the present disclosure relate to a base station (BS) and method for communication in a communication network. The method comprising signaling at least one antenna port number from multiple antenna port numbers to a UE. Also, the method comprises receiving a data and a reference signal (RS) corresponding to the UE. The data and the RS are received on one or more receive antennas of the BS, wherein the RS comprises occupied RS subcarriers and null subcarriers. A location of occupied RS subcarriers and null subcarrier positions are selected according to signaled antenna port. Next, channel parameters are estimated using the occupied subcarriers associated with the received RS, and interference plus noise parameters using the null subcarriers. Thereafter, equalizing the received data on the receive antennas using the measured channel parameters and the interference plus noise parameters for interference rejection and data detection.
    Type: Application
    Filed: January 18, 2022
    Publication date: September 8, 2022
    Inventors: Kiran Kumar KUCHI, Saidhiraj Amuru
  • Patent number: 11438232
    Abstract: Information technology discovery data items are received from a plurality of different discovery sources. The received information technology discovery data items are stored in a multisource data store. The received information technology discovery data items from the plurality of different discovery sources are reconciled to determine an attribute value of a configuration item. The determined attribute value of the configuration item is stored in a configuration management database (CMDB).
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: September 6, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Manish Gupta, Navindra Sharma, Satish Babu Krishnamoorthy, Kiran Kumar Bushireddy, Swapnesh Patel, Rukshan Felix Perera, Anand Karandikar
  • Patent number: 11436098
    Abstract: One example method includes, in response to a crash event, obtaining data protection system credentials, accessing a target storage of the data protection system, obtaining, from the target storage, a configuration file including configuration information for a data protection cluster, and using, by the data protection cluster, the configuration information to self-configure. The method further includes creating a consistency group (CG) of a group of volume, and restoring a journal volume to append backup indexes.
    Type: Grant
    Filed: August 2, 2018
    Date of Patent: September 6, 2022
    Assignee: EMC IP Holding Company LLC
    Inventor: Kiran Kumar Dudala
  • Patent number: 11435927
    Abstract: One example method includes moving a volume from a source server to a target server. In one example, the volume is moved and the need to copy the source data is eliminated. The volume to be moved is selected and metadata associated with the save sets stored on the volume is exported to a volume bootstrap, which is also stored on the selected volume. The volume is mounted or attached to the target server and the metadata is imported from the volume bootstrap. The volume is made read/write and is moved from the source server to the target server.
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: September 6, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Michael Roche, Ashish Goyal, Scott Quesnelle, Kiran Kumar Malle Gowda
  • Patent number: 11436007
    Abstract: Methods, systems, and computer-storage media are provided for validating the configuration of one or more applications to be used by one or more users in a healthcare management system. Requests are received to perform a configuration validation for at least one application at a first location. Configuration file data comprising one or more requirements and configuration data for the at least one application is obtained. The configuration validation is performed by conducting a comparative analysis on the configuration file data and the configuration data. If the data is identical, then the requirements are met, and the correct version of the application is installed. If the data is not identical, then the system identifies the correct version that needs to be installed. A message is generated for the first user comprising the configuration validation outcome.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: September 6, 2022
    Assignee: CERNER INNOVATION, INC.
    Inventors: Bhuvaneshwari Cg, Vikram Nandwani, Kiran Kumar Bhojaraja, Premjit Adhikary, Palak Goyal
  • Patent number: 11438756
    Abstract: Methods, systems, and devices for wireless communications are described. A method may include identifying an absence of a subscriber identity module (SIM) profile (e.g., in response to powering on a communication component). The method may further include determining a provider-specific configuration for communications with a wireless network and generating a set of SIM configuration parameters for a registration procedure with the wireless network based on identifying the absence of the SIM profile and the provider-specific configuration. The method may further include performing a registration procedure with the wireless network using the set of SIM configuration parameters.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: September 6, 2022
    Assignee: QUALCOMM Incorporated
    Inventors: Jose Alfredo Ruvalcaba, Arvind Vardarajan Santhanam, Kiran Kumar Vemareddy
  • Patent number: 11438273
    Abstract: A method, an apparatus, and a computer program product for real-time processing in wireless communications systems. An interruption of processing of one or more first symbol packets at one or more wireless communication components is detected. A predetermined period of time for a delay in processing of one or more second symbol packets is determined. Processing of one or more second symbol packets is delayed until expiration of the predetermined period of time. Processing of one or more second symbol packets is then performed.
    Type: Grant
    Filed: July 20, 2020
    Date of Patent: September 6, 2022
    Assignee: AltioStar Networks, Inc.
    Inventors: Raghunath Hariharan, Kiran Kumar Jakkur Srinivasa Murthy
  • Patent number: 11423377
    Abstract: In a multi-tenant web services platform, a request is received from a first customer requesting that a second customer be allowed to use a computing resource associated with the first customer. Control of the computing resource is transferred to the second customer based on a constraint selected by the first customer. A first portion of a cost associated with the computing resource is billed to the first customer. The control of the computing resource by the second customer is terminated in accordance with the constraint selected by the first customer.
    Type: Grant
    Filed: August 26, 2013
    Date of Patent: August 23, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Mohammed Samir Alabsi, David John Ward, Jr., Kiran Kumar Meduri, Karthigeyan Seetharaman
  • Patent number: 11410061
    Abstract: Systems and methods are provided for dynamic selection of anomaly detection options for particular metric data. Metric data corresponding to one or more configuration items of an information technology (IT) infrastructure is collected. A selected anomaly detection action option that applies to the metric data is identified. An action is performed using the metric data, based upon the selected anomaly detection action option. A dashboard graphical user interface (GUI) display results of the action.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: August 9, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Kanwaldeep K. Dang, Anand Nikhil Mehta, Kiran Kumar Bushireddy, Swapnesh Patel, Bnayahu Makovsky
  • Publication number: 20220243437
    Abstract: Various embodiments include components (e.g., a processor in a vehicle advanced driver assistance system) configured to identify subsystems that require testing in order to verify their compliance with a safety requirement. The components may determine whether verification of compliance requires that the subsystems be tested at PON, at POFF, during runtime or a combination thereof, dynamically determine the achievable parallelism for testing the identified subsystems, dynamically determine coverage level requirements for performing or executing built in self tests (BISTs) on each identified subsystem, and perform or execute the BISTs on the subsystems at the determined level of parallel and at the determined coverage level.
    Type: Application
    Filed: January 29, 2021
    Publication date: August 4, 2022
    Inventors: Kiran Kumar MALIPEDDI, Rahul GULATI
  • Publication number: 20220245153
    Abstract: An automatic rule generation and evaluation system enables a user to generate rules and evaluate the rules even as the rules are generated. The user employs a rules workbench user interface (UI) to provide input regarding the rules to be implemented on data obtained from a plurality of data sources. The rules workbench UI generates scripts from the user input. The scripts are employed to build a model and generate queries. Displaying the result sets obtained from executing the queries enables the user to evaluate the rules in real-time. If the user is satisfied, the user may finalize the rules, else the user can further modify the rules and the steps of rule modification and rule evaluation may be iterated until the rules are finalized.
    Type: Application
    Filed: May 11, 2021
    Publication date: August 4, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Kiran Kumar Govindaraju BANGALORE, Ashis Kumar ROY
  • Patent number: 11399024
    Abstract: A communal computing device, such as an interactive digital whiteboard, can become unlocked if a user is near the device. The communal computing device may use a sensor such as a camera to capture images of a person and obtain an identifier from a personal device such as a smartphone. A cloud-based provider that is trusted by both the communal computing device and the personal device may associate both the image and the identifier of the personal device with the same user identity. Obtaining the user identity from multiple, different sources provides a secure technique for the communal computing device to recognize a user without the user directly interacting with the communal computing device. If the sensor no longer detects the user or the personal device is no longer detected, then the communal computing device may log off the user. The personal device may be used to confirm log off.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: July 26, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Raju Jain, Dipesh Bhattarai, Peter Gregory Davis, Jeffrey Johnson, Liang Zhang, Kiran Kumar
  • Patent number: 11399282
    Abstract: Technologies directed to a secured peer-to-peer cloud-assisted authentication exchange protocol are described. A first wireless device receives a first request including information identifying a second wireless device. The first wireless device determines that the information matches second information. The first wireless device activates a virtual access point (VAP) with a modified service set identifier (SSID) having a group identifier appended to a first SSID. The first wireless device authenticates the second wireless device to the VAP. The first wireless device sends credentials and a second SSID to the second wireless device. The second SSID corresponds to a second access point (AP). The first wireless device receives a second request from the second wireless device to connect to the second AP. The first wireless device authenticates the second wireless device with the second AP. The first wireless device deactivates the VAP after expiration of an amount of time.
    Type: Grant
    Filed: June 22, 2020
    Date of Patent: July 26, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Kun Ting Tsai, Haritha Tamvada, Kiran Kumar Edara, Sarang Wagholikar, Nishant Suneel Sarmukadam, Ramesh Radhakrishnan
  • Publication number: 20220222012
    Abstract: Methods, systems, and devices for a read operation using compressed memory are described. An apparatus may include a host system coupled with a non-volatile memory device and a volatile memory device. The host system may store, in the volatile memory device, a compressed copy of data stored in the non-volatile memory device, for example, based on a score assigned to the data. The host system may identify that the compressed copy of the data is stored in the volatile memory device and may transmit a read command to the volatile memory device that includes a logical address associated with a logical block address of the data stored in the non-volatile memory device. The host system may receive the compressed copy of the data from the volatile memory device in response to the read command and may decompress the data.
    Type: Application
    Filed: January 8, 2021
    Publication date: July 14, 2022
    Inventors: Venkata Kiran Kumar Matturi, Tushar Chhabra, Sushil Kumar, Sharath Chandra Ambula
  • Publication number: 20220215660
    Abstract: In particular embodiments, a computing system may determine a user intent to perform a task in a physical environment surrounding the user. The system may send a query based on the user intent to a mapping server that stores a three-dimensional (3D) occupancy map containing spatial and semantic information of physical items in the physical environment. The mapping server may be configured to identify a subset of the physical items that are relevant to the user intent. The system may receive, from the mapping server, a response to the query comprising a portion of the 3D occupancy containing the subset of the physical items specific to the user intent. The system may capture a plurality of video frames of the physical environment. The system may process the plurality of video frames and the portion of the 3D occupancy map to provide one or more action labels associated with the task.
    Type: Application
    Filed: October 15, 2021
    Publication date: July 7, 2022
    Inventors: Miao Liu, Chao Li, Kiran Kumar Somasundaram