Manpreet Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
Abstract: A cloud services application executing on a cloud computing platform receives from a browser application executing on a customer computer system a request of a user to login to the cloud services application. The cloud services application further receives an indication via the browser application that biometric identifier authentication of the user is supported by the customer computer system, and transmits an indication to the browser application that biometric identifier authentication of the user is enabled for a session that is to be established. The cloud services application transmits a response to the login request, responsive to receipt of the login request, the response prompting the user to input a biometric identifier, and receives a unique identifier (UID) associated with the biometric identifier.
Abstract: The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of providing valuation of safety deposit boxes. The systems and methods provide a portal to digitally access a locker by a user. The systems and methods receive a request to access the locker from the user and authenticate the user to provide access. The systems and methods scan items placed within the locker. The systems and methods evaluate at least one item of the plurality of items placed inside the locker for digitized metrics to determine a valuation for the items in the safe locker. The systems and methods provide a portal for the locker such that an owner of the locker has exclusive access to the plurality of items and the digitized metrics.
Abstract: Techniques to dynamically select a video encoder for streaming video encoding are described. For example, in one embodiment, an apparatus may include an encoding configuration component operative to receive network performance information for a video stream at a sending device, the video stream at a first video bitrate with a first video encoding codec, and assign a second video bitrate with a second video encoding codec to a media component based on the network performance information, wherein the second video encoding codec is used based on generating the video stream at the second video bitrate, the media component operative to generate the video stream at the sending device at the second video bitrate with the second video encoding code, and the network component operative to send the video stream from the sending device to the receiving device using the second video encoding codec. Other embodiments are described and claimed.
Abstract: The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of providing digital access to safety deposit boxes. The systems and methods provide a portal to digitally access a locker by a user. The systems and methods receive a request to access the locker from the user and authenticate the user to provide access. The systems and methods receive a trigger to capture an image of the locker and capture an image of the interior of the locker. The systems and methods identify items within the locker using recognition algorithms; and associate the items with identified labels. The systems and methods annotate the captured image with the identified labels, wherein the annotations are overlaid onto the capture image to create an augmented reality image of the locker. The systems and methods send the image to the user on a user device associated with the user.
Abstract: An infotainment system in a vehicle includes at least one processor configured to, in response to occurrence of a trigger condition defined by an invitation from a source remote from the vehicle and identifying media content and to acceptance of the invitation, select a medium carrying the media content to play the media content. The trigger condition may be a current location of the vehicle matching a specified location, a weather condition at a current location of the vehicle matching a specified weather condition, a current speed of the vehicle exceeding a specified speed, a current date matching a specified date, or a current time of day matching a specified time of day. Alternatively, the trigger condition may be a signal indicating presence of a passenger or presence of a connection with a mobile device.
Abstract: A system is disclosed. The system includes a resource monitor to monitor a resource utilization of a set of resources of one or more instances, the resource utilization corresponding to a first level of performance and cost and an instance type determiner to, based on the resource utilization, determine if there is an instance type for at least one of the one or more instances, with a resource profile, that will provide a second level of performance and cost that is closer to a default level of performance and cost than the first level of performance and cost. In addition, the system also includes an instance type recommender to, based on the determining, perform one of making and not making a recommendation to replace the instance type of the at least one of the one or more instances.
Abstract: A metric data stream for a plurality of metrics may be retrieved from a database system. Each metric may measure a respective computing characteristic. The metric data stream may include a plurality of values for each of a sequence of time intervals. Each value may correspond with a respective one of the metrics. A plurality of metric correlation matrices may be determined for the metrics, each of which is associated with a respective time period in the metric data stream. A subset of comparison metric correlation matrices may be selected from the plurality of metric correlation metric matrices. A designated anomaly score may be determined for a designated time period by comparing a designated metric correlation matrix associated with the designated time period with the selected subset of comparison metric correlation metric matrices.
Abstract: Systems, methods, and computer-readable media are provided for a multi-tenant collaborative learning environment, where information from all tenants in a multi-tenant system is collected and used to provide individual tenants with code fixes and/or optimization recommendations based on the collected information. Other embodiments may be described and/or claimed.
Abstract: Techniques to dynamically configure a sender bitrate for streaming media connections are described. In one embodiment, an apparatus may comprise a media component operative to generate a media stream at a sending client device, the media stream comprising a video stream and an audio stream, the media stream configured for a sending bitrate; and modifying the sending bitrate based on a receiver-side bitrate value; a network component operative to send the media stream to a receiving client device; and a bitrate determination component operative to receive the receiver-side bitrate value from the receiving client device, the receiver-side bitrate value based on a first network performance measure and a second network performance measure, the first network performance measure based on the video stream in isolation from the audio stream, the second network performance measure based on the audio stream in isolation from the video stream. Other embodiments are described and claimed.
November 15, 2017
Date of Patent:
January 5, 2021
Manpreet Singh, YuanYuan Wang, Shruthi Murthy, Jonathan Sheller
Abstract: The disclosed embodiments provide a system for processing data. During operation, the system receives records of activity within a stream-processing system over a set of event streams, wherein each event stream in the set of event streams contains events related to a corresponding job in the stream-processing system. Next, the system indexes data in the records under a set of keys that include a first key related to jobs in the stream-processing system and a second key related to errors in the stream-processing system. The system then outputs the indexed data for use in analyzing the execution of the stream-processing system.
June 11, 2019
December 17, 2020
Abhishek Shivanna, Kartik Paramasivam, Ray Manpreet Singh Matharu, Samarth Shetty, Srinivasulu Punuru, Yi Pan, Prateek Maheshwari
Abstract: A first read request for data stored at a non-volatile memory is received by a primary storage controller. The data is programmed from the non-volatile memory to a first cache of the primary storage controller, the first cache to store the data over a first time range. A second read request is received for the data. In response to receiving the second read request for the data, the data is programmed to a second cache to store the data over a second time range that is greater than the first time range. A notification is transmitted to a secondary storage controller, the notification including information associated with the programming of the data to the second cache.
Abstract: The disclosed embodiments provide a system for managing a stream-processing application. During operation, the system allocates a first host for an active instance of the stream-processing application that maintains a state during processing of one or more input streams. Next, the system allocates a second host for a first backup instance that recreates the state on the active instance by consuming changes to the state replicated from the active instance without consuming the input stream(s). During a failure on the first host, the system moves the active instance to the first host by stopping the first backup instance on the second host. Finally, the system launches the active instance on the second host to resume processing of the input stream(s) by the active instance using the recreated state from the first backup instance.
June 5, 2019
December 10, 2020
Microsoft Technology Licensing, LLC
Bharath Kumarasubramanian, Jagadish Venkatraman, Jacob R. Maes, Kartik Paramasivam, Prateek Maheshwari, Ray Manpreet Singh Matharu, Samarth Shetty, Shanthoosh Pazhanjur Venkataraman, Yi Pan
Abstract: A messaging system establishes a secure call session between multiple parties. The call session is secured using an entropy value shared among parties in the call session. During the call session, the messaging system receives an instruction from a party in the call session to modify the call session. The call session may be modified by a party being added or removed from the session. Based on the received instruction, the messaging system performs an entropy value update to ensure that the call session is secure after the modification is made. A new entropy value is generated by a party in the call session and transmitted to other parties in the call session. Using the new entropy value, the messaging system establishes the modified secure call session.
Abstract: A circuit design is partitioned into a plurality of partitions during a first synthesis by a computer processor. After modification of the circuit design, the computer processor determines changed partitions and unchanged partitions of the circuit design. The computer processor then determines dependent partitions of the changed partitions. The changed partitions and the dependent partitions are re-synthesized by the computer processor into respective re-synthesized partitions, and the computer processor then combines the respective re-synthesized partitions and the unchanged partitions into a complete synthesized circuit design in a memory.
November 29, 2018
Date of Patent:
November 17, 2020
Kameshwar Chandrasekar, Aman Gayasen, Manpreet Singh, Surya Pratik Saha, Sanjay Saha
Abstract: Systems, device and techniques are disclosed for outlier discovery system selection. A set of time series data including time series data objects may be received. A sample of time series data objects may be extracted from the time series data. The sample of time series data objects may be decomposed into sub-components. Statistical classification may be used to select an outlier discovery system based on the sub-components. A neural network may be used to select an outlier discovery system based on the sub-components. A level of error of the neural network may be determined based on a comparison of the outlier discovery system selection made using statistical classification and the outlier discovery system selection made by the neural network. Weight of the neural network may be updated based on the level of error of the neural network.
Abstract: Systems and methods for provisioning infrastructure to application workloads may include receiving, by a server computing system, profile information of an application workload, the profile information describing resource usage of the application workload; receiving, by the server computing system, burn-in information for hardware components of an infrastructure, the burn-in information including benchmark information; receiving, by the server computing system, hardware configuration information associated with the infrastructure, the hardware information including capacity information; receiving, by the server computing system, a policy definition describing provisioning parameters; generating, by the server computing system, a first infrastructure distribution based at least on the profile information, the burn-in information, the hardware configuration information, and the policy definition; and provisioning, by the server computing system, the infrastructure to the application workload based at least on t
Abstract: Embodiments of the invention identify entities stored within or across a number of data stores and identify relationships between the entities. A relationships graph is generated that represents the entities and the identified relationships between entities, the relationships graph comprising nodes in the relationships graph to represent one or more entities and edges between any two nodes in the relationships graph to represent the identified relationships between the one or more entities represented by each of the two nodes. The relationships graph is stored in a graph store. A graph query is received against selected nodes and edges in the graph store. One or more data store queries are generated therefrom, to be executed against respective selected ones of the one or more entities and their respective identified relationships based on the graph query and the graph store. The one or more data store queries are applied to selected one or more of the number of data stores.
Abstract: Methods and systems are disclosed. The method comprises: designating a first plurality of links from a first stack segment to a second stack segment as a first etherchannel link; designating a second plurality of links from the first stack segment to a third stack segment as a second etherchannel link, where the second stack segment and the third stack segment are in communication with a fourth stack segment; designating the first etherchannel link and the second etherchannel link as members of a hierarchical etherchannel link; and sending a packet from the first stack segment to the fourth stack segment using the hierarchical etherchannel link.
March 30, 2020
July 16, 2020
Cisco Technology, Inc.
Linda T. Cheng, Manpreet Singh Sandhu, Subrat Mohanty, Ali Ahmad Tareen, Ganesh Srinivasa Bhat
Abstract: A system may include an application server and a user device. The application server may host an application customized for the user device. Tests may be designed to check the functionality of the application at the user device. The application and test may be designed using a page objects library which improve durability of the application and tests to changes made to the application. Thus, even if changes are made to the application, the test which check the functionality of the application may not break if the application and the tests are created based on the page objects library. The application sever may generate the page objects library and distribute the page objects library to its tenants.