Patents by Inventor Mahendra Kumar
Mahendra Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200232930Abstract: Aspects relating to gemstone profiling are described. A gemstone profiling system includes a holder that is rotatable by an actuator and can hold a gemstone, the gemstone having a reference mark. The system includes a non-contact measuring unit to determine a distance between a center of rotation of the gemstone and a surface of the gemstone. Further, the system includes a controller to rotate the gemstone through a plurality of orientations and receive the measured distance between a center of rotation of the gemstone and a surface of the gemstone in each of the plurality of orientations of the gemstone. The controller can generate a profile of the gemstone based on the received distance in the plurality of orientations.Type: ApplicationFiled: June 6, 2018Publication date: July 23, 2020Inventors: Chetan Fulchandbhai Patel, Munjalkumar Dhirajlal Gajjar, Rahul Mahendra kumar Gaywala
-
Publication number: 20200162371Abstract: Systems and methods provide for route optimization using real time traffic feedback. A network management system can subscribe to receive streaming telemetry (e.g., at line rate) for traffic associated with one or more managed network entities (e.g., flows, sites, networks, network devices, endpoints, applications, etc.) selected for route optimization. The network management system can determine a set of possible routes for the traffic. The network management system can compute metrics (e.g., packet loss, bit rate, throughput, delay, availability, jitter, etc.) for a set of possible routes for the traffic based on the streaming telemetry. The network management system can determine an optimal route from the set of possible routes based on the metrics. The network management system can inject the optimal route into the one or more network devices receiving the traffic to override a native route (e.g., determined by a routing protocol executed by the network devices).Type: ApplicationFiled: August 19, 2019Publication date: May 21, 2020Inventors: Amarender Musku, Mahendra Kumar Samarya, Harini Venkateswaran
-
Patent number: 10636086Abstract: A comparative reporting system provides financial benchmarking and analytics. Integrating public reporting and enterprise software systems, raw financial information from external sources derived from a plurality of reporting sources can be ingested and processed to extract attributes and metrics. The extracted attributes and metrics can be data warehoused together with financial information from the enterprise software system. Analytics can be performed to generate a comparison between the enterprise and the plurality of reporting sources.Type: GrantFiled: August 30, 2016Date of Patent: April 28, 2020Assignee: Oracle International CorporationInventors: Amit Goyal, Saurabh Verma, Ramy Yanetz, Mahendra Kumar, Vijay Aggarwal
-
Patent number: 10630706Abstract: Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The raw data can be filtered to extract data fields from the raw data that are relevant to detecting security threats in the local network. The filtered data can be converted into structured data that formats the information in the filtered data. The structured data may be formatted based on a set of schema, and can be used to generate a set of features. The security analytics system can use the generated features to build machine-learned models of the behavior of entities in the local network. The security analytics system can use the machine-learned models to generate threat scores representing the likelihood a security threat is present. The security analytics system can provide an indication of the security threat to a user.Type: GrantFiled: October 21, 2016Date of Patent: April 21, 2020Assignee: VMware, Inc.Inventors: Ravi Kumar Devi Reddy, Srinivas Rao Doddi, Mahendra Kumar Kutare, Christophe Briguet
-
Publication number: 20200075932Abstract: The present development is a process for the preparation of nanowire synthesis, coatings and uses thereof. Lithium titanate (LTO) nanowires are synthesized using a continuous hydrocarbon/plasma flame process technology combined with the dry impregnation method. The resulting LTO nanowires can be used as electro active anode materials for lithium ion batteries. The coating parameters, such as thickness, porosity of the film, packing density, and viscosity are controlled using the length of the nanowires, calendaring pressure, and slurry composition.Type: ApplicationFiled: August 29, 2019Publication date: March 5, 2020Inventors: Mahendra Kumar Sunkara, Vivekanand Kumar, Veerendra Atla
-
Publication number: 20190366277Abstract: Embodiments of the present disclosure describe a copolymer composition comprising a polyether-based copolymer, wherein the copolymer dissolves in one or more of an alcohol and alcohol-water mixture. Embodiments of the present disclosure describe a thin-film composite membrane comprising a porous support and a selective layer comprising a polyether-based copolymer, wherein the polyether-based copolymer dissolves in one or more of an alcohol and alcohol-water mixture. Embodiments of the present disclosure describe a method of capturing one or more chemical species comprising contacting a thin-film composite membrane with a fluid composition, wherein the fluid composition includes at least CO2 and capturing CO2 from the fluid composition. Embodiments of the present disclosure also describe methods of synthesizing copolymer compositions and methods of fabricating composite membranes.Type: ApplicationFiled: May 31, 2019Publication date: December 5, 2019Inventors: Madhavan KARUNAKARAN, Mahendra KUMAR, Rahul SHEVATE, Faheem Hassan AKHTAR, Klaus-Viktor PEINEMANN
-
Patent number: 10389742Abstract: Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The security analytics system parses the raw data into data fields. The security analytics system identifies a subset of the data fields based on the relevance of the data fields to detecting security threats in the local network. The security analytics system generates filtered data containing the subset of data fields and generates structured data based on the filtered data. The security analytics system identifies relationships between the plurality of entities, generates a set of features based on the structured data and the identified relationships, and generates one or more threat scores based on the set of features. The security analytics system detects malicious behavior performed by an entity in the local network based on the generated threat scores.Type: GrantFiled: October 21, 2016Date of Patent: August 20, 2019Assignee: VMware, Inc.Inventors: Ravi Kumar Devi Reddy, Srinivas Rao Doddi, Mahendra Kumar Kutare, Christophe Briguet
-
Patent number: 10305922Abstract: Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The security analytics system identifies the entities in the raw data and determines a set of properties about each of the identified entities. The entity properties contain information about the entity and can be temporary or permanent properties about the entity. The security analytics system determines relationships between the identified entities and can be determined based on the entity properties for the identified properties. An entity graph is generated that describes the entity relationships, wherein the nodes of the entity graph represent entities and the edges of the entity graph represent entity relationships. The security analytics system provides a user interface to a user that contains the entity graph and the relationships described therein.Type: GrantFiled: October 21, 2016Date of Patent: May 28, 2019Assignee: VMware, Inc.Inventors: Ravi Kumar Devi Reddy, Srinivas Rao Doddi, Mahendra Kumar Kutare, Christophe Briguet
-
Patent number: 10305879Abstract: In one embodiment, a server receives an authentication request from a device in a computer network, and authenticates the device. Then, upon receiving a service announcement from the authenticated device, the server determines authenticity of the service announcement from the authenticated device, and redistributes the service announcement into the computer network only when the service announcement from the authenticated device is an authentic service announcement.Type: GrantFiled: April 29, 2017Date of Patent: May 28, 2019Assignee: Cisco Technology, Inc.Inventors: Selvaraj Mani, Deep Preet Singh, Mahendra Kumar Samarya
-
Publication number: 20180316655Abstract: In one embodiment, a server receives an authentication request from a device in a computer network, and authenticates the device. Then, upon receiving a service announcement from the authenticated device, the server determines authenticity of the service announcement from the authenticated device, and redistributes the service announcement into the computer network only when the service announcement from the authenticated device is an authentic service announcement.Type: ApplicationFiled: April 29, 2017Publication date: November 1, 2018Inventors: Selvaraj Mani, Deep Preet Singh, Mahendra Kumar Samarya
-
Patent number: 9927318Abstract: A sensor system with performance compensation testing capability includes a sensor device, a resistance bridge, a signal conditioning circuit, a first test connector, and a second test connector. The resistance bridge circuit is disposed on the sensor device and includes an excitation terminal, a circuit common terminal, and two output terminals, and is configured, upon being energized, to supply a bridge output voltage across the two output terminals. The signal conditioning circuit is electrically coupled to the excitation terminal, the circuit common terminal, and the two output terminals, and is configured to supply a sensor output signal representative of bridge output voltage. The first test connector is electrically coupled to one of the two output terminals and is configured to be coupled to an impedance test device. The second test connector is electrically coupled to the circuit common terminal and is configured to be coupled to the impedance test device.Type: GrantFiled: November 16, 2016Date of Patent: March 27, 2018Assignee: Honeywell International IncInventors: Vishal Malhan, Mahendra Kumar Pradhan
-
Patent number: 9755023Abstract: The composition of matter comprising Ga(Sbx)N1?x where x=0.01 to 0.06 is characterized by a band gap between 2.4 and 1.7 eV. A semiconductor device includes a semiconductor layer of that composition. A photoelectric cell includes that semiconductor device.Type: GrantFiled: September 28, 2012Date of Patent: September 5, 2017Assignees: The University of Kentucky Research Foundation, The University of Louisville Research Foundation, Inc.Inventors: Madhu Menon, Michael Sheetz, Mahendra Kumar Sunkara, Chandrashekhar Pendyala, Swathi Sunkara, Jacek B. Jasinski
-
Patent number: 9661066Abstract: Techniques are provided for identifying a locations of application users based on originating address. Techniques to generate a set of address-to-location mappings include a system configured to receive information about a plurality of location-known requests that originated from an address, wherein the information indicates a plurality of locations for the originating address. The system is further configured to identify a geographical area based, at least in part, on the plurality of distinct locations; map the geographical area to a corresponding geographical locality; and associate the address to the geographical area and the corresponding geographical locality generating an address-to-location mapping. Address-to-location mappings may be further clustered into address-range-to-location mappings and stored as a data pack. Using these techniques, location information may be determined for a received location-unknown request that originated from a particular address.Type: GrantFiled: June 18, 2014Date of Patent: May 23, 2017Assignee: Yahoo! Inc.Inventors: Abhishek Seth, Mahendra Kumar
-
Publication number: 20170118236Abstract: Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The security analytics system parses the raw data into data fields. The security analytics system identifies a subset of the data fields based on the relevance of the data fields to detecting security threats in the local network. The security analytics system generates filtered data containing the subset of data fields and generates structured data based on the filtered data. The security analytics system identifies relationships between the plurality of entities, generates a set of features based on the structured data and the identified relationships, and generates one or more threat scores based on the set of features. The security analytics system detects malicious behavior performed by an entity in the local network based on the generated threat scores.Type: ApplicationFiled: October 21, 2016Publication date: April 27, 2017Inventors: Ravi Kumar Devi Reddy, Srinivas Rao Doddi, Mahendra Kumar Kutare, Christophe Briguet
-
Publication number: 20170118237Abstract: Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The raw data can be filtered to extract data fields from the raw data that are relevant to detecting security threats in the local network. The filtered data can be converted into structured data that formats the information in the filtered data. The structured data may be formatted based on a set of schema, and can be used to generate a set of features. The security analytics system can use the generated features to build machine-learned models of the behavior of entities in the local network. The security analytics system can use the machine-learned models to generate threat scores representing the likelihood a security threat is present. The security analytics system can provide an indication of the security threat to a user.Type: ApplicationFiled: October 21, 2016Publication date: April 27, 2017Inventors: Ravi Kumar Devi Reddy, Srinivas Rao Doddi, Mahendra Kumar Kutare, Christophe Briguet
-
Publication number: 20170118240Abstract: Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The security analytics system identifies the entities in the raw data and determines a set of properties about each of the identified entities. The entity properties contain information about the entity and can be temporary or permanent properties about the entity. The security analytics system determines relationships between the identified entities and can be determined based on the entity properties for the identified properties. An entity graph is generated that describes the entity relationships, wherein the nodes of the entity graph represent entities and the edges of the entity graph represent entity relationships. The security analytics system provides a user interface to a user that contains the entity graph and the relationships described therein.Type: ApplicationFiled: October 21, 2016Publication date: April 27, 2017Inventors: Ravi Kumar Devi Reddy, Srinivas Rao Doddi, Mahendra Kumar Kutare, Christophe Briguet
-
Patent number: 9630162Abstract: A reactor and method for production of nanostructures, including metal oxide nanowires or nanoparticles, are provided. The reactor includes a regulated metal powder delivery system in communication with a dielectric tube; a plasma-forming gas inlet, whereby a plasma-forming gas is delivered substantially longitudinally into the dielectric tube; a sheath gas inlet, whereby a sheath gas is delivered into the dielectric tube; and a microwave energy generator coupled to the dielectric tube, whereby microwave energy is delivered into a plasma-forming gas. The method for producing nanostructures includes providing a reactor to form nanostructures and collecting the formed nanostructures, optionally from a filter located downstream of the dielectric tube.Type: GrantFiled: April 4, 2012Date of Patent: April 25, 2017Assignee: University of Louisville Research Foundation, Inc.Inventors: Mahendra Kumar Sunkara, Jeong H. Kim, Vivekanand Kumar
-
Patent number: 9635785Abstract: A data center system includes a container to contain electronic racks of IT components operating therein, a cooling unit disposed underneath the electronic racks to receive cool liquid from a chiller unit, to exchange heat generated from the IT components, and to transmit the hot liquid carrying the exchanged heat back to the chiller unit. Each electronic rack includes a housing to house IT components arranged in a stack, a first rack aisle formed on a first side of the IT components to direct cool air received from the cooling unit upwardly, and a second rack aisle formed on a second side of the IT components to direct hot air to the cooling unit downwardly, where the host air is transformed from the cool air from the first rack aisle by flowing through an air space between the IT components.Type: GrantFiled: November 9, 2015Date of Patent: April 25, 2017Assignee: BAIDU USA LLCInventors: Ali Heydari, Eric Mahendra Kumar, Charles J. Ingalz, Weiyu Lu, Tianyi Gao, Manasa Sahini, Yan Cui
-
Publication number: 20170105317Abstract: A data center system includes a container to contain electronic racks of IT components operating therein, a cooling unit disposed underneath the electronic racks to receive cool liquid from a chiller unit, to exchange heat generated from the IT components, and to transmit the hot liquid carrying the exchanged heat back to the chiller unit. Each electronic rack includes a housing to house IT components arranged in a stack, a first rack aisle formed on a first side of the IT components to direct cool air received from the cooling unit upwardly, and a second rack aisle formed on a second side of the IT components to direct hot air to the cooling unit downwardly, where the host air is transformed from the cool air from the first rack aisle by flowing through an air space between the IT components.Type: ApplicationFiled: November 9, 2015Publication date: April 13, 2017Inventors: Ali Heydari, Eric Mahendra Kumar, Charles J. Ingalz, Weiyu Lu, Tianyi Gao, Manasa Sahini, Yan Cui
-
Publication number: 20170069020Abstract: A comparative reporting system provides financial benchmarking and analytics. Integrating public reporting and enterprise software systems, raw financial information from external sources derived from a plurality of reporting sources can be ingested and processed to extract attributes and metrics. The extracted attributes and metrics can be data warehoused together with financial information from the enterprise software system. Analytics can be performed to generate a comparison between the enterprise and the plurality of reporting sources.Type: ApplicationFiled: August 30, 2016Publication date: March 9, 2017Applicant: Oracle International CorporationInventors: Amit Goyal, Saurabh Verma, Ramy Yanetz, Mahendra Kumar, Vijay Aggarwal