Patents by Inventor KUMAR

KUMAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240257161
    Abstract: In the various embodiments, systems and methods are disclosed for determining user engagement with an application based on network traffic data corresponding to network traffic on a network. An aspect of the present disclosure is a method comprising obtaining network traffic data for a period of time, the network traffic data including a plurality of host calls; determining a host call sequence from the plurality of host calls, the host call sequence including one or more of the plurality of host calls; identifying an application corresponding to the host call sequence based on an augmented dataset; and determining a number of users of the application for the period of time based on a number of times the host call sequence repeats in the network traffic data.
    Type: Application
    Filed: January 30, 2023
    Publication date: August 1, 2024
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventors: Kevin PERKINS, Ashwini Kumar KOUNDURI
  • Publication number: 20240256865
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for training neural networks. One of the methods for training a neural network configured to perform a machine learning task includes performing, at each of a plurality of iterations: performing a training step to obtain respective new gradients of a loss function; for each network parameter: generating an optimizer network input; processing the optimizer network input using an optimizer neural network, wherein the processing comprises, for each cell: generating a cell input for the cell; and processing the cell input for the cell to generate a cell output, wherein the processing comprises: obtaining latent embeddings from the cell input; generating the cell output from the hidden state; and determining an update to the hidden state; and generating an optimizer network output defining an update for the network parameter; and applying the update to the network parameter.
    Type: Application
    Filed: February 1, 2024
    Publication date: August 1, 2024
    Inventors: Deepali Jain, Krzysztof Marcin Choromanski, Sumeet Singh, Vikas Sindhwani, Tingnan Zhang, Jie Tan, Kumar Avinava Dubey
  • Publication number: 20240255650
    Abstract: A satellite spoofing signal detection system with at least one primary antenna installed on a top side of a vehicle body, at least one secondary antenna installed on a bottom side of the vehicle body, and a spoofing controller is provided. The spoofing controller is configured to determine if a spoofing signal is present by comparing primary satellite signals received by the at least one primary antenna and secondary satellite signals received by the at least one secondary antenna. The spoofing controller determines if a spoofing signal is present by comparing a number of satellites used in position computations along with protection limits determined by the primary satellite signals and the secondary satellite signals. Other information from the primary and secondary antennas, such as visible satellites, receiver autonomous integrity monitoring, dilution of precision, and satellite almanac information may be used to determine if a spoofing signal is present.
    Type: Application
    Filed: March 20, 2023
    Publication date: August 1, 2024
    Applicant: Honeywell International Inc.
    Inventors: Perumal KUMAR, Sanjay LENKA
  • Publication number: 20240256347
    Abstract: Apparatus and method for detection, triaging and remediation of unreliable message execution in a multi-entity (e.g., multi-tenant) runtime. The described system solves this reliability issues of message handlers in a multi-tenant distributed application runtime by automated metering, detecting, triaging, remediating, and notifying stakeholders, in a proactive way. Doing so increases system availability and improves customer experience, as we continue to increase the scale of our services across the planet. As services are scaled across the world, the implementations described provide the benefit of reducing total cost-of-ownership, by reducing the linear operational cost that would be needed if humans had to deal with message processing service issues.
    Type: Application
    Filed: January 31, 2023
    Publication date: August 1, 2024
    Applicant: Salesforce, Inc.
    Inventors: Brian Toal, Ram Narsimhamurty Mantri Pragada, Amit Kumar
  • Publication number: 20240256490
    Abstract: Data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, are performed within a cloud environment. The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP. Methods are disclosed for content indexing data stored within a cloud environment to facilitate later searching, including collaborative searching. Methods are also disclosed for performing containerized deduplication to reduce the strain on a system namespace, effectuate cost savings, etc. Methods are disclosed for identifying suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy.
    Type: Application
    Filed: February 5, 2024
    Publication date: August 1, 2024
    Applicant: Commvault Systems, Inc.
    Inventors: Anand PRAHLAD, Marcus Muller, Rajiv KOTTOMTHARAYIL, Srinivas KAVURI, Parag GOKHALE, Manoj Kumar VIJAYAN
  • Publication number: 20240259926
    Abstract: A device such as a mobile device may be configured to connect to and/or communicate with one or more networks. The device may receive information indicating that there is at least one other network within a range of the device. One of the networks within range of the device may comprise a preferred cellular network. The device may then scan for the preferred cellular network and communicate with the preferred cellular network. The device may also detect the preferred cellular network based on information stored on the device. When the device is within range of the preferred cellular network, the device may detect the preferred cellular network based on the stored information and begin communicating with the preferred cellular network.
    Type: Application
    Filed: April 9, 2024
    Publication date: August 1, 2024
    Inventors: Prasad Ramanahally SIDDALINGA, Sanjay Kumar SHARMA
  • Publication number: 20240260157
    Abstract: Present disclosure provides a fixed lighting system and method for managing lighting in a closed environment for optimal work condition/living condition. The lighting system includes multiple illumination sources and a lighting management device connected to an illumination source through a lighting driver. The lighting management device includes an illumination sensor manager to determine a lighting condition parameter based on a lighting condition of the environment and an occupancy sensor manager to determine an occupancy parameter based on an occupancy in a predefined area of the environment. A light controller to receive the lighting condition parameter, the occupancy parameter and a lighting driver state, and determine an optimum level of illumination intensity and an optimum level of illumination color for the predefined area of the environment and a lighting driver controller to manage the lighting conditions of the predefined area of the environment.
    Type: Application
    Filed: April 13, 2023
    Publication date: August 1, 2024
    Applicant: Digitectura Technologies Pvt. Ltd
    Inventors: Murugavelu Thangavelu, Harish Kumar Muni Byrappa
  • Publication number: 20240256749
    Abstract: Retiming a circuit design can include determining whether or not an initial value specified for a candidate register can be removed based on an input logic cone to the candidate register and an output logic cone from the candidate register. The candidate register is a register in a critical path in the circuit design. The candidate register can be retimed into a retimed register in response to determining that the initial value specified for the candidate register can be removed. A new initial value for the retimed register can be derived based on initial values of registers in a logic cone of the retimed register, and the new initial value can be assigned to the retimed register.
    Type: Application
    Filed: January 27, 2023
    Publication date: August 1, 2024
    Applicant: Xilinx, Inc.
    Inventors: Chaithanya Dudha, Ruibing Lu, Shangzhi Sun, Nithin Kumar Guggilla
  • Publication number: 20240257281
    Abstract: A computer-implemented method including determining a feature-embedding vector for a listing item based on textual feature data and imagery feature data for the listing item. The method also can include determining, via a machine learning module, an intellectual property infringement prediction associated with a genuine item based on a feature-embedding vector for the genuine item and the feature-embedding vector for the listing item. Furthermore, the method can include upon determining that the intellectual property infringement prediction is positive, causing a take-down of the listing item from a retailer platform. Other embodiments are described.
    Type: Application
    Filed: January 30, 2024
    Publication date: August 1, 2024
    Applicant: Walmart Apollo, LLC
    Inventors: Arup Kumar Das, Rajat Gupta, Raviteja Uppalapati, Samrat Kokkula
  • Publication number: 20240257129
    Abstract: A system and method for performing a transaction at a software-based POS system of a merchant includes receiving, from the software-based POS system, a payment authorization request message. A processor is programmed to extract a dynamic hashed security token from the payment authorization request message. In addition, the processor is programmed to validate the dynamic hashed security token and, upon validating the dynamic hashed security token, determine that the software-based POS system that transmitted the payment authorization request message is running a mobile POS software application. Furthermore, the processor is programed to extract the hardware identifier and the application identifier from the transaction data and compare them to account registration information stored with a merchant account.
    Type: Application
    Filed: January 27, 2023
    Publication date: August 1, 2024
    Applicant: Mastercard International Incorporated
    Inventors: Sachin Kumar Singh, Kaushal Naveen Shetty, Venkata Satya Sivajee Pinnamaneni
  • Publication number: 20240257182
    Abstract: Systems and methods for automatically determining and providing digital advertisements with ensured relevancy to a search query are disclosed. In some embodiments, based on historical user session data, a query is determined to be a head query, torso query, or tail query. For each sponsored item, a relevance score is generated to represent a degree of relevancy between the sponsored item and the query, and it is determined whether the sponsored item is eligible to be recommended in response to the query based on: (a) comparing the relevance score to a first threshold when the query is a head or torso query, or (b) comparing the relevance score to a second threshold when the query is a tail query. Based on all sponsored items that are eligible to be recommended, a ranked list of recommended items is generated for display based on an auction mechanism.
    Type: Application
    Filed: January 30, 2023
    Publication date: August 1, 2024
    Inventors: Fanglida Yan, Tanay Kumar Saha, Musen Wen
  • Publication number: 20240252316
    Abstract: Embodiments of delivery systems, devices and methods for delivering a prosthetic heart valve device to a heart chamber for expanded implementation are disclosed. More specifically, methods, systems and devices are disclosed for delivering a self-expanding prosthetic mitral valve device to the left atrium, with no engagement of the left ventricle, the native mitral valve leaflets or the annular tissue downstream of the upper annular surface during delivery, and in some embodiments with no engagement of the ventricle, mitral valve leaflets and/or annular tissue located downstream of the upper annular surface by the delivered, positioned and expanded prosthetic mitral valve device.
    Type: Application
    Filed: November 8, 2023
    Publication date: August 1, 2024
    Inventors: Jeffrey W. Chambers, Gregory G. Brucker, Joseph P. Higgins, Saravana B. Kumar, Jason S. Diedering, Karl A. Kabarowski, Robert J. Thatcher, James E. Flaherty, Jeffrey R. Stone
  • Publication number: 20240252628
    Abstract: In some aspects, the disclosure relates to ActRII-ALK4 antagonists and methods of using ActRII-ALK4 antagonists to treat, prevent, or reduce the progression rate and/or severity of heart failure (HF), particularly treating, preventing or reducing the progression rate and/or severity of one or more HF-associated comorbidities. The disclosure also provides methods of using an ActRII-ALK4 antagonist to treat, prevent, or reduce the progression rate and/or severity of heart failure associated with a variety of conditions including, but not limited to, genetic cardiomyopathies, muscle wasting diseases, and muscular dystrophies.
    Type: Application
    Filed: June 16, 2021
    Publication date: August 1, 2024
    Inventors: Rajasekhar Naga Venkata Sai Suragani, Jia Li, Patrick Andre, Ravindra Kumar
  • Publication number: 20240252762
    Abstract: A syringe use monitoring device that can attach to a syringe and detect the type of medication being loaded and measure the force applied to the plunger and thus monitor subsequent delivery of medication and delivery pressure as a substance is being injected, and at least one display and/or alarm can indicate normal and/or abnormal conditions so that feedback can be employed during the injection process is provided.
    Type: Application
    Filed: September 11, 2023
    Publication date: August 1, 2024
    Inventors: Sawhney Nisha, Singh Kumar Shiv
  • Publication number: 20240253244
    Abstract: A hand controller assembly (200) of a console system (105) is disclosed herein. The hand controller assembly may include a backend assembly (209), where the backend assembly (209) or (301) is configured to facilitate movement of the hand controller (207b) in x, y, and z-coordinate axes. The hand controller assembly (200) further includes a left-hand controller (201a) and a right-hand controller (201b). The left and-controller (201a) includes a plurality of link members (211a) coupled to one another to form a linkage and the right-hand controller (201b) includes a plurality of link members (211b) coupled to one another to form a linkage. Proximal end of the plurality of link members (211a), (211b) is operationally secured to the backend assembly (209) and distal of the plurality of link member (211a), (211b) is operationally secured to a gimbal assembly (213a), (213b) respectively.
    Type: Application
    Filed: February 8, 2023
    Publication date: August 1, 2024
    Inventors: Sudhir Prem SRIVASTAVA, Vishwajyoti Pascual SRIVASTAVA, Anil Kumar PATIDAR, Yogesh SINGH, Himanshu SINGH
  • Publication number: 20240256266
    Abstract: A method, computer program product, and computer system for upgrading, by a computing device, a plurality of storage appliances in a cluster, wherein the storage appliance cluster may include at least a primary storage appliance and a secondary storage appliance. It may be determined that an upgrade to a plurality of storage appliances in a cluster has completed. Distributed data may be queried for each storage appliance in the cluster based upon, at least in part, determining that the upgrade to the plurality of storage appliances in the cluster has completed. Data stored in a management database in the primary storage appliance and data stored locally in the secondary storage appliance may be combined based upon, at least in part, querying the distributed data for each storage appliance in the cluster.
    Type: Application
    Filed: January 26, 2023
    Publication date: August 1, 2024
    Inventors: Venkatesh Madhipatla, Shobhit Nitinkumar Dutia, Shyam Sunder Singaraju, Rajesh Kumar Gandhi, Peixing Sun
  • Publication number: 20240256700
    Abstract: Techniques are disclosed pertaining to determining whether execution of a transaction will exceed a system resource threshold. A computer system stores a precomputed permissions data structure in association with particular data stored in a database. That precomputed data structure may be used to determine whether a user can access the particular data. The computer system may capture metric information that pertains to parameters involved in different types of transactions that can be performed to recompute the precomputed permissions data structure. Upon receiving a request to perform a transaction that involves recomputing the permissions data structure, the computer system, may determine, based on the metric information and the transaction's particular type, whether an execution of the transaction will exceed the system resource threshold.
    Type: Application
    Filed: January 31, 2023
    Publication date: August 1, 2024
    Inventors: Arjun Kumar Sirohi, Lakshman Martha, Sirisha Tummalapenta
  • Publication number: 20240257032
    Abstract: A method for dynamically rearranging one or more packages for delivery on a delivery vehicle in response to unforeseen changes in a pre-planned delivery route. The method detects, via one or more sensor-enabled shelves in a delivery vehicle, an address and package details of a respective delivery package. The method further integrates the one or more sensor-enabled shelves with a route map that depicts the pre-planned delivery route. The method further assigns new values to the one or more sensor-enabled shelves, in response to a change in the pre-planned delivery route, indicating a new sequence of delivery for each respective delivery package. The method further notifies a delivery person which delivery package is to be delivered at a current stop by illuminating the one or more sensor-enabled shelves containing the respective delivery package.
    Type: Application
    Filed: January 27, 2023
    Publication date: August 1, 2024
    Inventors: Nadiya Kochura, Tiberiu Suto, Hemant Kumar Sivaswamy, Jeremy R. Fox
  • Publication number: 20240259346
    Abstract: A system for compacting traffic separation policies in campus networks, the system comprising an access layer switch and a campus border switch. The access layer switch is configured to receive a definition of one or more policies; responsive to receiving a packet, determine whether any of the policies apply to the packet; responsive to determining that none of the policies apply, cause a tag to be inserted into a communication header of the packet and forward the packet; and responsive to determining that one of the policies applies, forward or drop the packet according to the applicable policy and omit the tag. The campus border switch is configured to, responsive to receiving a packet from the access layer switch, determine whether the packet includes the tag, and responsive to determining that the packet includes the tag, apply a traffic separation policy associated with the tag to the packet.
    Type: Application
    Filed: January 30, 2023
    Publication date: August 1, 2024
    Inventors: Vinayak Joshi, Venkata Varadhan Devarajan, Rajib Majila, Sathyanarayana Gopal, Hari Anil Kumar
  • Publication number: 20240259396
    Abstract: A computer-implemented method for monitoring and remediating security drift in a public cloud network is disclosed. The security drift event includes an unintended change to existing security controls effected through an unauthorized deployment channel, performed by an unauthorized user. The method includes providing a cloud server application including a number of cloud client accounts, and deploying the cloud client accounts in client account clusters. The client account clusters include a master account that includes a drift detection component and a number of service accounts including serverless application components. The method further includes instantiating cloud infrastructure resources in the service accounts, and detecting a security drift event in the client account cluster, by the drift detection components.
    Type: Application
    Filed: January 31, 2023
    Publication date: August 1, 2024
    Inventors: Neha Kerkar, Prabhat Singh, Amit Chakrabarty, Aditya Suresh Kumar