Patents by Inventor Manav .
Manav . has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20110235538Abstract: A method and system for validating SIPSI of a broadcast table in an electronic device is provided. The method includes receiving a first cache signature and retrieving a second cache signature from a memory. The method also includes identifying differences between the first cache signature and the second cache signature. Further, the method includes performing one of updating the broadcast table and updating a portion of the broadcast table. The system includes an electronic device for validating SIPSI of a broadcast table. The electronic device includes a broadcast receiver for receiving a first cache signature and a memory for storing a second cache signature. The electronic device also includes a processor for identifying differences between the first cache signature and the second cache signature. Further, the electronic device includes the processor for performing one of updating the broadcast table and updating a portion of the broadcast table.Type: ApplicationFiled: November 24, 2009Publication date: September 29, 2011Inventors: Yogesh Manav, Mahantesh Sangappa Shettar
-
Publication number: 20110220194Abstract: The light conversion efficiency of a solar cell (10) is enhanced by using an optical downshifting layer (30) in cooperation with a photovoltaic material (22). The optical downshifting layer converts photons (50) having wavelengths in a supplemental light absorption spectrum into photons (52) having a wavelength in the primary light absorption spectrum of the photovoltaic material. The cost effectiveness and efficiency of solar cells platforms (20) can be increased by relaxing the range of the primary light absorption spectrum of the photovoltaic material. The optical downshifting layer can be applied as a low cost solution processed film composed of highly absorbing and emissive quantum dot heterostructure nanomaterial embedded in an inert matrix to improve the short wavelength response of the photovoltaic material. The enhanced efficiency provided by the optical downshifting layer permits advantageous modifications to the solar cell platform that enhances its efficiency as well.Type: ApplicationFiled: July 14, 2010Publication date: September 15, 2011Applicant: Spectrawatt, Inc.Inventors: Juanita N. Kurtin, Alex R. Guichard, Steven M. Hughes, Alex C. Mayer, Oun Ho Park, Shawn R. Scully, Paul-Emile B. Trudeau, Colin C. Reese, Manav Sheoran, Georgeta Masson
-
Patent number: 7979703Abstract: A method and system for determining the reputation of a sender for sending desirable communications is provided. The reputation system identifies senders of communications by keys sent along with the communications. The reputation system then may process a communication to determine whether it is a desirable communication. The reputation system then establishes a reputation for the sender of the communication based on the assessment of whether that communication and other communications sent by that sender are desirable. Once the reputation of a sender is established, the reputation system can discard communications from senders with undesired reputations, provide to the recipient communications from senders with desired reputations, and place in a suspect folder communications from senders with an unknown reputation.Type: GrantFiled: October 19, 2005Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Carl M. Ellison, Elissa E. S. Murphy, Manav Mishra
-
Publication number: 20110098998Abstract: A Multiscale Finite Volume (MSFV) method is provided to efficiently solve large heterogeneous problems; it is usually employed for pressure equations and delivers conservative flux fields to be used in transport problems. It relies on the hypothesis that the fine-scale problem can be described by a set of local solutions coupled by a conservative coarse-scale problem. In numerically challenging cases, a more accurate localization approximation is used to obtain a good approximation of the fine-scale solution. According to an embodiment, a method is provided to iteratively improve the boundary conditions of the local problems, and is responsive to the data structure of the underlying MSFV method and employs a Krylov-subspace projection method to obtain an unconditionally stable scheme and accelerate convergence. In one embodiment the MSFV operator is used. Alternately, the MSFV operator is combined with an operator derived from the problem solved to construct the conservative flux field.Type: ApplicationFiled: October 27, 2010Publication date: April 28, 2011Applicant: Chevron U.S.A. Inc.Inventors: Ivan Fabrizio LUNATI, Manav Tyagi, Seong H. Lee
-
Publication number: 20110060663Abstract: A system for providing online merchants with purchase propensity information is provided. The system includes a processor and a purchase propensity module executable by the processor. The purchase propensity module receives, from an online merchant computer, a message containing a customer identifier that identifies a customer who has established an online browsing session with the online merchant. In response, the purchase propensity module transmits to the online merchant computer purchase propensity data associated with the identified customer while the browsing session is in progress. This allows the online merchant computer to determine a targeted offer for the user while the user is in the online browsing session.Type: ApplicationFiled: September 10, 2010Publication date: March 10, 2011Inventors: Michael McPhie, Manav Gupta, Charles Wilson
-
Patent number: 7904517Abstract: Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.Type: GrantFiled: August 9, 2004Date of Patent: March 8, 2011Assignee: Microsoft CorporationInventors: Nina W Kang, Joshua T Goodman, Robert L Rounthwaite, Josh Benaloh, Elissa E Murphy, Manav Mishra, Gopalakrishnan Seshadrinathan, Derek M Hazeur, Ryan C Colvin
-
Publication number: 20110047617Abstract: Various embodiments provide protection against web resources associated with one or more undesirable activities. In at least some embodiments, a method detects and responds to a user-initiated activity on a computing device. Responding can include, by way of example and not limitation, checking locally, on the computing device, whether a web resource that is associated with the user-initiated activity has been identified as being associated with a safe site. Furthermore, in at least some embodiments, the method checks remotely, away from the computing device, whether the web resource is identified as being at least possibly associated with one or more undesirable activities.Type: ApplicationFiled: November 4, 2010Publication date: February 24, 2011Applicant: Microsoft CorporationInventors: Aaron H. Averbuch, Manav Mishra, Roberto A. Franco, Tariq Sharif
-
Patent number: 7831915Abstract: Various embodiments provide protection against web resources associated with one or more undesirable activities. In at least some embodiments, a method detects and responds to a user-initiated activity on a computing device. Responding can include, by way of example and not limitation, checking locally, on the computing device, whether a web resource that is associated with the user-initiated activity has been identified as being associated with a safe site. Furthermore, in at least some embodiments, the method checks remotely, away from the computing device, whether the web resource is identified as being at least possibly associated with one or more undesirable activities.Type: GrantFiled: November 10, 2005Date of Patent: November 9, 2010Assignee: Microsoft CorporationInventors: Aaron H Averbuch, Manav Mishra, Roberto A. Franco, Tariq Sharif
-
Patent number: 7769868Abstract: A method and system are disclosed. The method includes receiving a first request from a user at a dispatcher that corresponds to a first transaction. The method further includes creating at the dispatcher a unique identifier that is associated with the user. The unique identifier is based on data that is received from the user. A server is then assigned to the first request by adding an entry to a mapping table that is maintained by the dispatcher. The unique identifier is then associated with the assigned server.Type: GrantFiled: March 29, 2006Date of Patent: August 3, 2010Assignee: Intel CorporationInventors: Manav Mishra, Satyendra Yadav
-
Patent number: 7734176Abstract: A system and method for a cell switching optical network. A block of data is buffered at an edge node and sliced into data slices. Slice headers are pre-appended to each data slice. The data slices are then scheduled for transmission onto an optical switching network during fixed time slots defined on a per carrier wavelength basis.Type: GrantFiled: December 22, 2003Date of Patent: June 8, 2010Assignee: Intel CorporationInventors: Manav Mishra, Christian Maciocco
-
Patent number: 7689652Abstract: Email spam filtering is performed based on a combination of IP address and domain. When an email message is received, an IP address and a domain associated with the email message are determined. A cross product of the IP address (or portions of the IP address) and the domain (or portions of the domain) is calculated. If the email message is known to be either spam or non-spam, then a spam score based on the known spam status is stored in association with each (IP address, domain) pair element of the cross product. If the spam status of the email message is not known, then the (IP address, domain) pair elements of the cross product are used to lookup previously determined spam scores. A combination of the previously determined spam scores is used to determine whether or not to treat the received email message as spam.Type: GrantFiled: January 7, 2005Date of Patent: March 30, 2010Assignee: Microsoft CorporationInventors: Manav Mishra, Elissa E. S. Murphy, Geoffrey J Hulten, Joshua T. Goodman, Wen-Tau Yih
-
Patent number: 7660865Abstract: Disclosed are signature-based systems and methods that facilitate spam detection and prevention at least in part by calculating hash values for an incoming message and then determining a probability that the hash values indicate spam. In particular, the signatures generated for each incoming message can be compared to a database of both spam and good signatures. A count of the number of matches can be divided by a denominator value. The denominator value can be an overall volume of messages sent to the system per signature for example. The denominator value can be discounted to account for different treatments and timing of incoming messages. Furthermore, secure hashes can be generated by combining portions of multiple hashing components. A secure hash can be made from a combination of multiple hashing components or multiple combinations thereof. The signature based system can also be integrated with machine learning systems to optimize spam prevention.Type: GrantFiled: August 12, 2004Date of Patent: February 9, 2010Assignee: Microsoft CorporationInventors: Geoffrey J. Hulten, Joshua T. Goodman, Robert L. Rounthwaite, Manav Mishra, Elissa E. Murphy, John D. Mehr
-
Patent number: 7634810Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.Type: GrantFiled: May 13, 2005Date of Patent: December 15, 2009Assignee: Microsoft CorporationInventors: Joshua T. Goodman, Paul S Rehfuss, Robert L. Rounthwaite, Manav Mishra, Geoffrey J Hulten, Kenneth G Richards, Aaron H Averbuch, Anthony P. Penta, Roderic C Deyo
-
Patent number: 7603422Abstract: Secure safe sender lists are described. In an implementation, a method includes determining which of a plurality of hierarchical levels corresponds to a message received via a network. Each of the hierarchical level is defined by mechanisms for identifying a sender of the message. The message is routed according to the corresponding one of the hierarchical levels.Type: GrantFiled: December 27, 2004Date of Patent: October 13, 2009Assignee: Microsoft CorporationInventors: Elissa E. S. Murphy, Geoffrey J Hulten, Manav Mishra, Robert L. Rounthwaite
-
Patent number: 7599993Abstract: Secure safe sender lists are described. In an implementation, a method includes examining a message received from a sender via a network to determine which identifying mechanisms are available for verifying an identity of the sender. When one or more available identifying mechanisms are deemed sufficient to verify the identity, a description of the identity and a description of the one or more said available identifying mechanisms are added to a safe senders list.Type: GrantFiled: December 27, 2004Date of Patent: October 6, 2009Assignee: Microsoft CorporationInventors: Elissa E. S. Murphy, Geoffrey J Hulten, Manav Mishra, Robert L. Rounthwaite
-
Publication number: 20090182425Abstract: The present invention relates to a sheet or tubular structure consisting of biocompatible material, which is elastic and comprises at least one biologically active substance in at least one region and to a sheet or tubular structure, which comprises at least one biologically active substance release-modifying agent in at least one region as well as an implant covered at least partially by the sheet or tubular structure of the invention. The present invention further provides a method and an apparatus for producing, and preferably customizing and/or optimizing, the sheet or tubular structure of the invention. The sheet or tubular structure of the invention can be customized/optimized before implantation in the operating room.Type: ApplicationFiled: December 3, 2008Publication date: July 16, 2009Applicant: Charite - Universitatsmedizin BerlinInventors: Georg Duda, Metha Manav, Patrick Strube
-
Publication number: 20090177959Abstract: To provide valuable information regarding a webpage, the webpage must be divided into distinct semantically coherent segments for analysis. A set of heuristics allow a segmentation algorithm to identify an optimal number of segments for a given webpage or any portion thereof more accurately. A first heuristic estimates the optimal number of segments for any given webpage or portion thereof. A second heuristic coalesces segments where the number of segments identified far exceeds the optimal number recommended. A third heuristic coalesces segments corresponding to a portion of a webpage with much unused whitespace and little content. A fourth heuristic coalesces segments of nodes that have a recommended number of segments below a certain threshold into segments of other nodes. A fifth heuristic recursively analyzes and splits segments that correspond to webpage portions surpassing a certain threshold portion size.Type: ApplicationFiled: January 8, 2008Publication date: July 9, 2009Inventors: DEEPAYAN CHAKRABARTI, Manav Ratan Mital, Swapnil Hajela, Emre Velipasaoglu
-
Patent number: 7525989Abstract: Described are a system and method of transmitting a time slot status message between nodes in a SONET network. One or more time slots in a SONET link may be allocated to provision a SONET circuit. Upon provisioning or de-provisioning the SONET circuit, a time slot status message may be transmitted to one or more non-participating nodes in the SONET network to indicate a change in status of one or more time slots of the SONET link.Type: GrantFiled: December 16, 2002Date of Patent: April 28, 2009Assignee: Intel CorporationInventors: Linda Cline, Christian Maciocco, Srihari Makineni, Manav Mishra
-
Patent number: 7409708Abstract: Disclosed are systems and methods that facilitate spam detection and prevention at least in part by building or training filters using advanced IP address and/or URL features in connection with machine learning techniques. A variety of advanced IP address related features can be generated from performing a reverse IP lookup. Similarly, many different advanced URL based features can be created from analyzing at least a portion of any one URL detected in a message.Type: GrantFiled: May 28, 2004Date of Patent: August 5, 2008Assignee: Microsoft CorporationInventors: Joshua T Goodman, Robert L Rounthwaite, Geoffrey J Hulten, John A Deurbrouck, Manav Mishra, Anthony P Penta
-
Patent number: 7397795Abstract: A method and system for label-based packet forwarding among multiple forwarding elements is described. The system includes a plurality of forwarding elements to forward a data packet from an ingress port at which the data packet is received from a network to an egress port from which the data packet will be transmitted to a next hop in the network and a control element coupled to the plurality of forwarding elements to control the forwarding elements. Each forwarding element has one or more label switch tables with one or entries to label data packets for forwarding along a path from the ingress port of one of the plurality of forwarding elements to the egress port of another of the plurality of forwarding elements.Type: GrantFiled: February 24, 2003Date of Patent: July 8, 2008Assignee: Intel CaliforniaInventors: Hsin-Yuo (York) Liu, Puqi (Perry) Tang, Manav Mishra, Sanjay Bakshi