Patents by Inventor Mukesh Kumar Singh

Mukesh Kumar Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190177282
    Abstract: The present invention relates to an improved process for the preparation of eluxadoline and its intermediates and that includes the use of an aqueous surfactant solution in the preparation of N2-[(benzyloxy)carbonyl]-N-(2-oxo-2-phenylethyl)-L-alaninamide, an intermediate in the preparation of eluxadoline.
    Type: Application
    Filed: May 30, 2017
    Publication date: June 13, 2019
    Inventors: Pankaj Kumar SINGH, Mukesh Kumar MADHRA, Mohan PRASAD
  • Patent number: 8707419
    Abstract: The present invention provides a system, method and apparatus for protecting against high volume attacks. The present invention receives a packet, determines a source of the received packet, and updates a tree-based data structure based on the source of the received packet. The received packet is accepted or passed on whenever one or more statistics stored within the tree-based data structure do not exceed a threshold. The received packet is dropped whenever the one or more statistics exceed the threshold. The present invention can be implemented in hardware, software or a combination thereof. The software will implement the steps as one or more code segments of a computer program embodied on a computer readable medium.
    Type: Grant
    Filed: June 27, 2007
    Date of Patent: April 22, 2014
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Krishna Sobhan Bhaskar Kokkiligadda, Mukesh Kumar Singh, Samrat Saha
  • Patent number: 8582567
    Abstract: The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).
    Type: Grant
    Filed: August 9, 2006
    Date of Patent: November 12, 2013
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Venkatesan Iyengar Prasanna, Satyam Tyagi, Guru Thodime, Pravin Khandelwal, Chandrasekhar Manchenella, Mukesh Kumar Singh, Raghavendra Venkata Thodime
  • Patent number: 8296279
    Abstract: Systems, methods, and computer program products identifying a search query, the search query including at least one search term. An index is used to identify a word as a search result for the search query, where the index includes a substring of the word, one or more inclusive strings corresponding to the substring, the one or more inclusive strings including the substring and at least one more character, and one or more word objects, the one or more word objects identifying content including the substring of the word.
    Type: Grant
    Filed: June 3, 2008
    Date of Patent: October 23, 2012
    Assignee: Google Inc.
    Inventor: Mukesh Kumar Singh
  • Publication number: 20090144820
    Abstract: The present invention provides a system, method and apparatus for protecting against high volume attacks. The present invention receives a packet, determines a source of the received packet, and updates a tree-based data structure based on the source of the received packet. The received packet is accepted or passed on whenever one or more statistics stored within the tree-based data structure do not exceed a threshold. The received packet is dropped whenever the one or more statistics exceed the threshold. The present invention can be implemented in hardware, software or a combination thereof. The software will implement the steps as one or more code segments of a computer program embodied on a computer readable medium.
    Type: Application
    Filed: June 27, 2007
    Publication date: June 4, 2009
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Krishna Sobhan Bhaskar Kokkiligadda, Mukesh Kumar Singh, Samrat Saha
  • Publication number: 20040174995
    Abstract: Cryptosystem using public key with message much larger than the public key modulus by arranging message into a matrix and encrypting the determinant rather than every element followed by multiplication of the matrix by the encrypted determinant. Private key decryption of determinant of the encrypted matrix provides the inverse, and then multiplication by the encrypted matrix recovers message. Further, a preprocessing permutation of the message defined by a hash of the message or by random numbers helps maintain atomicity of the message.
    Type: Application
    Filed: February 5, 2004
    Publication date: September 9, 2004
    Inventor: Mukesh Kumar Singh