Patents by Inventor Mohan Das

Mohan Das has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9973517
    Abstract: Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: May 15, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Hsu-Chun Hsiao, Shuo Deng, Babak Salamat, Rajarshi Gupta, Saumitra Mohan Das
  • Patent number: 9970757
    Abstract: Methods, apparatuses, and non-transitory processor-readable media of the present disclosure are presented for efficiently executing applications based on pressure sensor data. In some embodiments, a method includes monitoring pressure, and determining a rate of change in the pressure over time exceeds a predetermined rate-of-pressure-change threshold. The method further includes subsequently determining that the rate of change in the pressure over time no longer exceeds the predetermined rate-of-pressure-change threshold. The method further includes determining a change in pressure has exceeded a predetermined pressure-change threshold, and performing floor disambiguation.
    Type: Grant
    Filed: May 8, 2014
    Date of Patent: May 15, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Saumitra Mohan Das, Faraz Mohammad Mirzaei
  • Patent number: 9961496
    Abstract: Various embodiments include methods, and computing devices configured to implement the methods, for anomaly monitoring using context-based sensor output correlation. A computing device may obtain output of a first sensor and may determine that an anomaly is likely to occur based on the obtained output of the first sensor. The computing device may transmit a message indicating that the anomaly is likely to occur, causing receiving computing devices to begin logging output of sensors of the receiving computing devices. The computing device may determine whether the anomaly did occur. If the anomaly did occur, the computing device may transmit a sensor output request. Nearby computing devices may receive this sensor output request and may transmit collected sensor data to the first computing device. The first computing device may receive the sensor output collected by the various receiving devices and may correlate the first sensor output with the received sensor output.
    Type: Grant
    Filed: June 17, 2016
    Date of Patent: May 1, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Seyed Ali Ahmadzadeh, Saumitra Mohan Das, Rajarshi Gupta, Govindarajan Krishnamurthi
  • Patent number: 9945269
    Abstract: A switchable valve train assembly including a rocker shaft is provided. The rocker shaft includes a first chamber extending between a first axial end and a second axial end of the rocker shaft and a second chamber extending between the first axial end and the second axial end of the rocker shaft. A seepage orifice is defined between the first chamber and the second chamber and provides a fluid connection between the first chamber and the second chamber. The first chamber includes a first actuator port in fluid connection with a first intake port for a hydraulic lash adjuster. The second chamber includes a second actuator port in fluid connection with a second intake port for a locking assembly.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: April 17, 2018
    Assignee: Schaeffler Technologies AG & Co. KG
    Inventors: Faheem Ahmed, Colin Foster, David Chandler, John Whitton, Debora Manther, Pradeep Mohan Mohan Das, Sumukha Nagaraj
  • Patent number: 9945270
    Abstract: A hollow rocker shaft including a central opening defined by a radially inner surface and a separator secured in the central opening of the rocker shaft is provided. A radially outer surface of the separator engages the radially inner surface of the rocker shaft via a press-fit. The separator divides the central opening of the rocker shaft into (1) a first chamber extending between a first chamber axial end and the separator, and (2) a second chamber extending between a second chamber axial end and the separator. The separator includes an orifice defined between the first chamber and the second chamber that provides fluid connection between the first chamber and the second chamber.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: April 17, 2018
    Assignee: Schaeffler Technologies AG & Co. KG
    Inventors: Faheem Ahmed, Colin Foster, David Chandler, John Whitton, Debora Manther, Pradeep Mohan Mohan Das, Sumukha Nagaraj
  • Patent number: 9938862
    Abstract: A switching hydraulic fluid gallery de-aeration arrangement for a switchable valve arrangement is disclosed. A housing for a hydraulic lash adjuster assembly is positioned in a bore of a cylinder head. The housing includes a first, hydraulic lash adjuster fluid port in a first annular groove, and a second switching hydraulic fluid port in a second annular groove. A top land and a bottom land are positioned next to the annular grooves and each have a primary outer diameter. A middle land is defined axially between the grooves. The middle land has a reduced outer diameter relative to the primary outer diameter, or the bore has an annular groove between the top and bottom lands that defines a restricted flow path between a hydraulic lash adjuster fluid gallery and a switching hydraulic fluid gallery that maintains hydraulic fluid in the switching hydraulic fluid gallery.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: April 10, 2018
    Assignee: Schaeffler Technologies AG & Co. KG
    Inventors: David Chandler, Pradeep Mohan Mohan Das, Peter Sailer
  • Publication number: 20180094551
    Abstract: A switchable roller finger follower includes an inner lever, an outer lever pivotably mounted to the inner lever by a pivot axle, and a coupling device. The coupling device includes a coupling pin configured to move between a locked position in which the inner lever and the outer lever are connected together for movement in at least one direction and an unlocked position in which the inner lever is movable relative to the outer lever in the at least one direction. The coupling device also includes a spring configured to bias the coupling pin in the locked or unlocked position. A de-aeration flow path is formed between an oil passage and an opening for allowing air to move out of the oil passage, past the coupling pin, and exit through the opening. The de-aeration flow path switches between being open and closed based on a position of the coupling pin.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Applicant: Schaeffler Technologies AG & Co. KG
    Inventors: Pradeep Mohan Mohan Das, Faheem Ahmed, David Chandler
  • Patent number: 9930884
    Abstract: An abrasive article comprising a nonwoven substrate material impregnated with a first and second formulation. The first and second formulations have broad spectrum antimicrobial effectiveness against one or more microbial organisms. The first and second formulations include the same or different polymer compositions, which include one or more antimicrobial agents and abrasive particles uniformly dispersed in the polymer compositions.
    Type: Grant
    Filed: January 17, 2017
    Date of Patent: April 3, 2018
    Assignees: SAINT-GOBAIN ABRASIVES, INC., SAINT-GOBAIN ABRASIFS
    Inventors: Soumyajit Basu, Kottotil Mohan Das, Rishwanth Sathyamurthy, Anindya Agasty, Abhay Jain
  • Publication number: 20180080349
    Abstract: A fluid diverter including a cylindrical body and an extension arm is provided. The cylindrical body defines a first fluid passage extending from a first axial end of the cylindrical body and a second fluid passage circumferentially offset from the first fluid passage and extending from a second axial end of the cylindrical body. A seepage orifice is defined in the cylindrical body providing a fluid communication path between the first axial end and the second axial end. The extension arm extends from the cylindrical body and includes a locating receptacle dimensioned to receive a fixing element to rotationally and axially fix the fluid diverter.
    Type: Application
    Filed: September 21, 2016
    Publication date: March 22, 2018
    Applicant: Schaeffler Technologies AG & Co. KG
    Inventors: Debora MANTHER, John WHITTON, Pradeep Mohan MOHAN DAS
  • Publication number: 20180077188
    Abstract: Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign applications (e.g., malware, etc.) and other threats before a more permanent solution or defense (e.g., a patch or software upgrade) becomes available and installed on the client computing device. The server device may be configured to receive reports from the client computing devices, receive threat feeds from a third-party server (e.g., threat intelligence servers, etc.), and use information included in the received threat feed and information included in the received reports to analyze, in the server computing device, a software application that is operating on a client device in multiple passes. The server may generate one or more threat scores and send the one or more threat scores to the client computing device for use in devising a customized security response.
    Type: Application
    Filed: September 12, 2016
    Publication date: March 15, 2018
    Inventors: Giridhar Mandyam, Sudha Anil Kumar Gathala, Saumitra Mohan Das, Nayeem Islam, Dallas James Wiener, Hugo Romero, Harold Gilkey
  • Publication number: 20180077195
    Abstract: Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign applications (e.g., malware, etc.) and other threats before a more permanent solution or defense (e.g., a patch or software upgrade) becomes available and installed on the client computing device. The server device may be configured to receive reports from the client computing devices, receive threat feeds from third-party servers (e.g., threat intelligence servers, etc.), and use information included in the received threat feed and information included in the received reports to analyze, in the server computing device, a software application that is operating on a client device in multiple passes. The server may generate threat scores (e.g., one for each pass, etc.), and the threat scores to the client computing device for use in devising a customized security response.
    Type: Application
    Filed: September 12, 2016
    Publication date: March 15, 2018
    Inventors: Sudha Anil Kumar Gathala, Saumitra Mohan Das, Nayeem Islam, Dallas James Wiener, Hugo Romero, Harold Gilkey, Giridhar Mandyam
  • Publication number: 20180063179
    Abstract: Various embodiments include methods and a memory data collection processor for performing online memory data collection for memory forensics. Various embodiments may include determining whether an operating system executing in a computing device is trustworthy. In response to determining that the operating system is not trustworthy, the memory data collection processor may collect memory data directly from volatile memory. Otherwise, the operating system to collect memory data from volatile memory. Memory data may be collected at a variable memory data collection rate determined by the memory data collection processor. The memory data collection rate may depend upon whether an available power level of the computing device exceeds a threshold power level, whether an activity state of the processor of the computing device equals a sleep state whether a security risk exists on the computing device, and whether a volume of memory traffic in the volatile memory exceeds a threshold volume.
    Type: Application
    Filed: August 26, 2016
    Publication date: March 1, 2018
    Inventors: Mastooreh Salajegheh, Sudha Anil Kumar Gathala, Saumitra Mohan Das, Nayeem Islam
  • Publication number: 20180054449
    Abstract: A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.
    Type: Application
    Filed: August 18, 2016
    Publication date: February 22, 2018
    Inventors: Sriram Nandha Premnath, Yin Chen, Saumitra Mohan Das, Nayeem Islam
  • Publication number: 20180054361
    Abstract: Methods and apparatus for enhanced overlay state maintenance in a peer-to-peer overlay network. A first method includes inferring that a first node is leaving the overlay network, and transmitting a decrement message to decrement a size counter value. A second method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a segment length associated with each node of the set of nodes, and determining a size of the overlay network by dividing the total number of nodes in the set of nodes by the sum of the segment lengths. A third method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a size estimate associated with the first node and with each node of the set of nodes, and determining a size of the overlay network by averaging the size estimates.
    Type: Application
    Filed: January 14, 2016
    Publication date: February 22, 2018
    Inventors: Saumitra Mohan Das, Vidhya Narayanan, Lakshminath Dondeti, Ranjith S. Jayaram
  • Publication number: 20180045085
    Abstract: A switching hydraulic fluid gallery de-aeration arrangement for a switchable valve arrangement is disclosed. A housing for a hydraulic lash adjuster assembly is positioned in a bore of a cylinder head. The housing includes a first, hydraulic lash adjuster fluid port in a first annular groove, and a second switching hydraulic fluid port in a second annular groove. A top land and a bottom land are positioned next to the annular grooves and each have a primary outer diameter. A middle land is defined axially between the grooves. The middle land has a reduced outer diameter relative to the primary outer diameter, or the bore has an annular groove between the top and bottom lands that defines a restricted flow path between a hydraulic lash adjuster fluid gallery and a switching hydraulic fluid gallery that maintains hydraulic fluid in the switching hydraulic fluid gallery.
    Type: Application
    Filed: August 10, 2016
    Publication date: February 15, 2018
    Applicant: Schaeffler Technologies AG & Co. KG
    Inventors: David CHANDLER, Pradeep Mohan MOHAN DAS, Peter SAILER
  • Publication number: 20180039779
    Abstract: A computing device may be protected from non-benign behavior, malware, and cyber attacks by using a combination of predictive and real-time behavior-based analysis techniques. A computing device may be configured to identify anticipated behaviors of a software application before runtime, analyze the anticipated behaviors before runtime to generate static analysis results, commencing execution of the software application, analyze behaviors of the software application during runtime via a behavior-based analysis system, and control operations of the behavior-based analysis system based on the static analysis results.
    Type: Application
    Filed: August 4, 2016
    Publication date: February 8, 2018
    Inventors: Dong Li, Yin Chen, Saumitra Mohan Das
  • Patent number: 9888360
    Abstract: Embodiments may automatically place access points (APs) on floor plans by incorporating a number of conventions for identifying types and locations of APs. These conventions may include the name of APs, MAC addresses, lat/lon information, and feature analysis or image recognition techniques for matching visual cues if the AP locations are marked on images. Some embodiment may conduct several other operations to optimize placement of APs. These optimization operations may reduce the number of steps needed to place APs on floor plans, and/or may reduce extraneous and superfluous information from the floor plans that may clutter the annotated floor plan map.
    Type: Grant
    Filed: February 8, 2013
    Date of Patent: February 6, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Abhinav Sharma, Sunil Patel, Murthy S. Vempati, Saumitra Mohan Das, Chandrakant Mehta, Rupali T. Desai
  • Patent number: 9866993
    Abstract: Disclosed are methods, devices, systems, apparatus, servers, computer-/processor-readable media, and other implementations, including a method, performed at a processor-based wireless mobile device, that includes receiving, by the mobile device, signals that include at least one message comprising antenna information for a first wireless node transmitting the signals, and transmitting, by the mobile device, an information message including the antenna information for the first wireless node to a remote device configured to receive and store antenna data for multiple wireless nodes obtained by one or more wireless devices while visiting respective areas covered by the multiple wireless nodes.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: January 9, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Saumitra Mohan Das, Sai Pradeep Venkatraman, Subash Marri Sridhar, Carlos Horacio Aldana
  • Publication number: 20170364136
    Abstract: Embodiments include computing devices, apparatus, and methods implemented by the apparatus for implementing wake lock aware scheduling. The apparatus may receive a wake lock request by a wake lock profiler and acquire wake lock information of a wake lock event associated with the wake lock request. The wake lock information may include a wake lock time parameter. The apparatus may send a hint having the wake lock time parameter. The apparatus may receive the hint, determine whether ready jobs can execute during the wake lock event, and send a request for permission to schedule the ready jobs for execution during the wake lock event in response to determining that the ready jobs can execute during the wake lock event.
    Type: Application
    Filed: June 18, 2016
    Publication date: December 21, 2017
    Inventors: Sriram Nandha Premnath, Sudha Anil Kumar Gathala, Saumitra Mohan Das
  • Publication number: 20170366935
    Abstract: Various embodiments include methods, and computing devices configured to implement the methods, for anomaly monitoring using context-based sensor output correlation. A computing device may obtain output of a first sensor and may determine that an anomaly is likely to occur based on the obtained output of the first sensor. The computing device may transmit a message indicating that the anomaly is likely to occur, causing receiving computing devices to begin logging output of sensors of the receiving computing devices. The computing device may determine whether the anomaly did occur. If the anomaly did occur, the computing device may transmit a sensor output request. Nearby computing devices may receive this sensor output request and may transmit collected sensor data to the first computing device. The first computing device may receive the sensor output collected by the various receiving devices and may correlate the first sensor output with the received sensor output.
    Type: Application
    Filed: June 17, 2016
    Publication date: December 21, 2017
    Inventors: Seyed Ali Ahmadzadeh, Saumitra Mohan Das, Rajarshi Gupta, Govindarajan Krishnamurthi