Patents by Inventor Mohit

Mohit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250139298
    Abstract: Methods and systems for managing data processing systems are disclosed. The data processing systems may be managed by verifying the integrity of the data processing systems. The integrity may be verified as a prerequisite to use of the data processing systems. The integrity may be verified, at least in part, by verifying that the hardware component loadout of a data processing system is as expected. If the actual hardware component loadout diverges from an expected hardware component loadout, then remedial activity may be performed to address the differences between the actual and expected hardware component loadout.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: VINODKUMAR VASUDEV OTTAR, ABEYE TESHOME, RICHARD M. TONRY, BASSEM EL-AZZAMI, MOHIT ARORA, LUIS ANTONIO VALENCIA REYES, ADOLFO SANDOR MONTERO, RAJARAVI CHANDRA KOLLARAPU, AMY CHRISTINE NELSON
  • Publication number: 20250141929
    Abstract: Methods and systems for managing an endpoint detection and response (EDR) framework for data processing systems are disclosed. To monitor for malicious entities, a management controller of a data processing system may obtain a data package including data managed by hardware resources of the data processing system. The data package may be provided to a trusted management system via an out of band communication channel and the management controller may monitor for responses from the trusted management system. If the management controller identifies a response indicating that the data processing system is in a compromised state, one or more actions may be performed to remediate the compromised state of the data processing system.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: RICHARD M. TONRY, ABEYE TESHOME, BASSEM EL-AZZAMI, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, ADOLFO SANDOR MONTERO, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250141888
    Abstract: Methods and systems for managing policies for data processing systems are disclosed. A management controller for the data processing system may utilize an out of band communication channel to obtain a set of policies for the data processing system from a remote management system. The management controller may monitor a state of the data processing system and may identify when a condition is met for any policy of the set of the policies. If the condition is met, the management controller may select one or more actions based on the state and the policy for which the condition was met. The management controller may perform the one or more actions to update operation of the data processing system to obtain an updated data processing system.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: ABEYE TESHOME, BASSEM EL-AZZAMI, MOHIT ARORA, ADOLFO SANDOR MONTERO, RICHARD M. TONRY, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250141697
    Abstract: Methods and systems for managing onboarding of a data processing system are disclosed. To manage onboarding of the data processing system, an entitlement certificate may be obtained from an ownership voucher transferred to the data processing system as part of an onboarding of the data processing system. The entitlement certificate may include a list of entitlements for the data processing system signed using a private key of a public private key pair maintained by a manufacturer of the data processing system. A management controller of the data processing system may utilize the entitlement certificate to request entitlements for the data processing system and to perform action sets to manage the entitlements. The requested entitlements may be verified as trusted by any entity with a public key of the public private key pair maintained by the manufacturer.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: RAJARAVI CHANDRA KOLLARAPU, RICHARD M. TONRY, ABEYE TESHOME, BASSEM EL-AZZAMI, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, ADOLFO SANDOR MONTERO, LUIS ANTONIO VALENCIA REYES
  • Publication number: 20250141928
    Abstract: Methods and systems for managing policies for data processing systems are disclosed. A management controller for the data processing system may utilize an out of band communication channel to obtain a policy for the data processing system from a trusted management system if the data processing system is reported as lost or stolen by an owner of the data processing system. The management controller may identify a state of the data processing system as powered or unpowered. The management controller may then identify one or more actions specified by the policy and based on the state of the data processing system to be performed. By doing so, the management controller may discourage unintended use of the data processing system by a user other than the owner of the data processing system.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: BASSEM EL-AZZAMI, ABEYE TESHOME, RICHARD M. TONRY, MOHIT ARORA, ADOLFO SANDOR MONTERO, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250138945
    Abstract: Methods and systems for managing a data processing system are disclosed. The data processing system may provide computer-implemented services and may include in-band hardware resources that operate as specified by operation data of the data processing system while providing the services. However, if the operation data becomes unavailable to the data processing system, then the data processing system may be unable to provide the desired services. Therefore, to increase the likelihood of providing the desired services, the operation data may be managed using distributed backup and recovery processes. To decrease security risk associated with operation data backup and recovery, the distributed processes may be performed using out-of-band components of the data processing system, bypassing in-band hardware components that may be more vulnerable to being compromised (e.g., by a malicious party).
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: ABEYE TESHOME, GOKUL THIRUCHENGODE VAJRAVEL, RICHARD M. TONRY, BASSEM EL-AZZAMI, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, ADOLFO SANDOR MONTERO, RAJARAVI CHANDRA KOLLARAPU
  • Publication number: 20250141856
    Abstract: Methods and systems for registering a management controller of a data processing system with a new message broker are disclosed. The management controller may be previously registered with an existing message broker. A server may provide a certificate for the data processing system to the new message broker and the server may notify the management controller that the registration process has been initiated. In response, hardware resources of the management controller may provide a registration request to the new message broker. The new message broker may provide a challenge to the management controller via an out of band communication channel and the management controller may provide a challenge response also via the out of band communication channel. Doing so may complete the registration of the management controller with the new message broker. The server may then un-enroll the management controller from the existing message broker.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: VINODKUMAR VASUDEV OTTAR, ABEYE TESHOME, RICHARD M. TONRY, BASSEM EL-AZZAMI, MOHIT ARORA, LUIS ANTONIO VALENCIA REYES, ADOLFO SANDOR MONTERO, RAJARAVI CHANDRA KOLLARAPU
  • Patent number: 12287829
    Abstract: A computer-implemented method, system and computer program product for minimizing hash collisions of composite keys. Each component (“key component”) of the composite key is converted into a linear index that uniquely represents that key component. Such a one-to-one mapping reduces the length (i.e., range of values the key component represents) of each component without introducing any collisions thereby effectively resulting in the lossless compression of the individual key components. Such a linear index for each converted key component is stored in a separate lookup memory. A reduced composite key is then created by joining together the linear indices that represent the components of the composite key thereby reducing the total length or domain (i.e., range of values the composite key represents) of the original composite key in a lossless manner. In this manner, by reducing the total length of the composite key, hash collisions of composite keys are minimized.
    Type: Grant
    Filed: February 23, 2023
    Date of Patent: April 29, 2025
    Assignee: International Business Machines Corporation
    Inventors: Bharat Sukhwani, Sameh Asaad, Mohit Kapur
  • Patent number: 12288406
    Abstract: The present disclosure relates to systems, methods, and non-transitory computer readable media for accurately enhancing optical character recognition with a machine learning approach for determining words from reverse text, vertical text, and atypically-sized text. For example, the disclosed systems segment a digital image into text regions and non-text regions utilizing an object detection machine learning model. Within the text regions, the disclosed systems can determine reverse text glyphs, vertical text glyphs, and/or atypically-sized text glyphs utilizing an edge based adaptive binarization model. Additionally, the disclosed systems can utilize respective modification techniques to manipulate reverse text glyphs, vertical text glyphs, and/or atypically-sized glyphs for analysis by an optical character recognition model.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: April 29, 2025
    Assignee: Adobe Inc.
    Inventors: Ankit Bal, Mohit Gupta, Ram Bhushan Agrawal, Tarun Verma, Uttam Dwivedi
  • Patent number: 12285480
    Abstract: Disclosed herein are methods for inducing immunity against a severe acute respiratory syndrome (SARS) coronavirus 2 (SARS-CoV2) in a patient in need thereof. The method comprises administering a vaccine composition comprising a self-adjuvanted SARS-CoV2 Spike (S) RNA-based vaccine (AAHI-SC2), followed by administering a replication defective adenovirus (hAd5) vaccine composition, wherein the adenovirus comprises an E1 gene region deletion and an E2b gene region deletion.
    Type: Grant
    Filed: August 18, 2021
    Date of Patent: April 29, 2025
    Assignee: NantCell, Inc.
    Inventors: Adrian Rice, Mohit Verma
  • Patent number: 12288478
    Abstract: A method of managing an interaction of a student with a class about a subject, the subject having at least one lesson having at least one topic, the topic having at least one of exposition content, demonstration content and test content, the test content having a query and a scheme for mapping a response to a result, comprising: presenting content to the student and storing the interaction of the student with the content presented.
    Type: Grant
    Filed: September 15, 2020
    Date of Patent: April 29, 2025
    Assignee: LEARNINGMATE SOLUTIONS PRIVATE LIMITED
    Inventors: Mailarangam Ramani Ganesh Kumar, Deepak Nadar, Samudra Sen, Prasanna Mohit Bhargava
  • Publication number: 20250132270
    Abstract: A chip package includes a package substrate and an integrated circuit (IC) die disposed on the package substrate. The IC dies includes a security asset. The chip package also includes a glass based shield selectively disposed on the IC die and above the security asset. The glass based shield is configured to block access to the security asset. In some embodiments, the chip package includes an oxide layer disposed between the glass based shield and the IC die. In some embodiments, the chip package includes a detection module and a wire connecting the detection module to the glass based shield. The detection module is configured to generate and send a serial bit stream to the glass based shield. The detection module is also configured to monitor for changes in the serial bit stream returning from the glass based shield. Changes detected in the serial bit stream indicates the glass based shield has been tampered.
    Type: Application
    Filed: October 23, 2023
    Publication date: April 24, 2025
    Inventors: Mohit ARORA, Deepak Vasant KULKARNI, Richard E. GEORGE, Terry Eugene RICHARDSON
  • Publication number: 20250133821
    Abstract: Integrated circuit structures having cut metal gates, and methods of fabricating integrated circuit structures having cut metal gates, are described. For example, an integrated circuit structure includes a fin having a portion protruding above a shallow trench isolation (STI) structure. A gate dielectric material layer is over the protruding portion of the fin and over the STI structure. A conductive gate layer is over the gate dielectric material layer. A conductive gate fill material is over the conductive gate layer. A dielectric gate plug is laterally spaced apart from the fin, the dielectric gate plug on but not through the STI structure. The gate dielectric material layer and the conductive gate layer are not along sides of the dielectric gate plug, and the conductive gate fill material is in contact with the sides of the dielectric gate plug.
    Type: Application
    Filed: December 23, 2024
    Publication date: April 24, 2025
    Inventors: Tahir GHANI, Mohit K. HARAN, Mohammad HASAN, Biswajeet GUHA, Alison V. DAVIS, Leonard P. GULER
  • Publication number: 20250130884
    Abstract: A set of incident records are received for a computing system. The incident records are analyzed to identify similar incident records which are then linked. Incident clusters are generated based upon the links and incident records in each cluster are ranked. A prompt is generated to an artificial intelligence (AI) model based on the ranked, related incidents and the AI model returns a response that identifies a root cause and mitigation steps corresponding to the ranked incidents.
    Type: Application
    Filed: October 19, 2023
    Publication date: April 24, 2025
    Inventors: Jimmy Chi Kin WONG, Supriyo GHOSH, Rakesh Jayadev NAMINENI, Mohit VERMA, Chetan BANSAL, Namrata JAIN, Rujia WANG, Wei ZHOU, Sukriti JAIN, Sanjana GUNDALA, Xuchao ZHANG, Senthil Kumar MUNIYANDI
  • Publication number: 20250131646
    Abstract: Systems, methods, and apparatus are provided for generating dynamic metaverse accommodations using artificial intelligence. A user device may initiate a metaverse session. Deep learning networks may derive a user profile based on data from the user device and generate a set of samples from the user profile. The generated samples may include user characteristics and avatar features associated with the user characteristics. The generated samples may be used to train a multitask machine learning model. Deep learning networks may generate a metaverse accommodation targeted to the user profile. The accommodation may be rendered in the metaverse environment. The accommodation may be transmitted to an actuator at the user device. The accommodation may be stored in association with user characteristics in a distributed ledger.
    Type: Application
    Filed: October 19, 2023
    Publication date: April 24, 2025
    Inventors: Rahul Uniyal, Mohit Dhingra, Srikanth Vemula
  • Publication number: 20250126474
    Abstract: Wireless communication between two electronic devices may be used to determine a distance between the two devices, even in the presence of an otherwise-disruptive attacker. A wireless receiver system of one device may receive a true wireless ranging signal from a first transmitting device and a false wireless ranging signal from an attacker. The wireless receiver system may correlate the wireless signals with a known preamble sequence and perform channel estimation using the result, obtaining a channel impulse response for the wireless signals. The wireless receiver system may filter the channel impulse response for the plurality of wireless signals by removing at least part of the channel impulse response due to the false wireless ranging signal while not removing at least part of the channel impulse response due to the true wireless ranging signal. The receiver system may perform a wireless ranging operation using the filtered channel impulse response.
    Type: Application
    Filed: November 22, 2024
    Publication date: April 17, 2025
    Inventors: Shang-Te Yang, Xu Chen, Alejandro J. Marquez, Mohit Narang, Indranil S. Sen
  • Patent number: 12277202
    Abstract: A method including: capturing or receiving data associated with behavior of a user of a virtual reality device during a session in a virtual environment, wherein the data includes sensory inputs associated with the user from one or more sensors and information associated with user parameters; initiating authentication of the user in the virtual environment; comparing the captured or received data with historic data of the user, wherein the historic data is associated with behavior of the user monitored for a plurality of sessions over a period of time in the virtual environment; determining a score based on the comparison; comparing the score with a predefined threshold score; and in response to determining that the score is above the predefined threshold score, authenticating the user.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: April 15, 2025
    Assignee: Visa International Service Association
    Inventor: Mohit Sharma
  • Patent number: 12277090
    Abstract: A method performed by one or more processing resources of one or more computer systems is disclosed. The method comprises receiving an object at a first of a plurality of nodes from a second of the plurality of storage nodes within a cluster switch fabric, examining a value associated included within the received object, wherein the value is associated with a clock value of the second node and updating a clock operating at the first node with the received value.
    Type: Grant
    Filed: October 11, 2022
    Date of Patent: April 15, 2025
    Assignee: NetApp, Inc.
    Inventors: Vijay Srinath, Ramakrishna Rao Yadala, Mohit Devarakonda, Shilpa Kumar
  • Publication number: 20250117649
    Abstract: Systems and methods are provided for generating and updating a dependency graph that is used in combination with textual information about incidents to improve incident-linking suggestions. Systems and methods are also provided for generating, training, and using a machine learning model configured to perform incident linking using both graph data and text data. Beneficially, these systems and methods align the graph data and text data in order to more efficiently and accurately leverage information from the multi-modal data.
    Type: Application
    Filed: November 28, 2023
    Publication date: April 10, 2025
    Inventors: Supriyo GHOSH, Jimmy WONG, Chetan BANSAL, Rakesh Jayadev NAMINENI, Mohit VERMA, Saravanakumar RAJMOHAN, Karish GROVER
  • Patent number: D1072859
    Type: Grant
    Filed: May 9, 2023
    Date of Patent: April 29, 2025
    Assignee: ADP, Inc.
    Inventors: Mohit Goel, Gaurav Singh, Baidurjya Sinha