Patents by Inventor Nikhil George
Nikhil George has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11899748Abstract: A computing system comprises a data storage and at least one processor communicatively coupled to the data storage. The at least one processor is configured to execute program instructions to cause the system to perform the following steps. A deep neural network (“DNN”) model is trained using training data. Next, additional scenes are determined based on the DNN model and the training data. The determined scenes are generated, and then used to augment the training dataset. The DNN model is then retrained using the augmented training dataset and stored in a data storage for deployment.Type: GrantFiled: September 6, 2019Date of Patent: February 13, 2024Assignees: VOLKSWAGEN AKTIENGESELLSCHAFT, AUDI AG, PORSCHE AGInventors: Pratik Prabhanjan Brahma, Nasim Souly, Nikhil George
-
Patent number: 11875551Abstract: In one embodiment, a method includes obtaining candidate data generated by a vehicle. The candidate data comprises a subset of sensor data identified based on a set of neural network models executing on the vehicle. The method also includes determining whether the candidate data can be associated with one or more categories of a set of categories for training data based on a set of categorization models. The method further includes associating the candidate data with the first category in response to determining that the candidate data can be associated with at a first category of the set of categories. The method further includes determining whether the candidate data can be associated with a second category. The set of categories lacks the second category. The method further includes including the second category in the set of categories in response to determining that the candidate data can be associated with the second category.Type: GrantFiled: June 9, 2020Date of Patent: January 16, 2024Assignees: NAVBIRSWAGEN AKTIENGESELLSCHAFT, PORSCHE AG, AUDI AGInventors: Pratik Brahma, Nikhil George, Oleg Zabluda
-
Publication number: 20230385436Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by using a slave device that will enable or disable protection for applications as required. The device supports one or more users, none or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges the processes running in that Application Security Environment have while that Application Security Environment is in that state.Type: ApplicationFiled: August 10, 2023Publication date: November 30, 2023Inventors: George Madathilparambil George, Nikhil George
-
Patent number: 11766998Abstract: A vehicle attachment for guiding a vehicle includes a magnetic tape sensor, at least one sensor, a controller, at least one coupling device for attachment to the vehicle, and a vehicle interface system. The magnetic tape sensor is configured to detect a path. The at least one sensor can detect whether there are any obstructions along the path. The controller is configured to steer the vehicle along the predefined path and to adjust the speed of the vehicle to avoid coming in contact with any obstructions. The vehicle interface system is configured to communicatively couple the controller to at least one electronic control unit of the vehicle.Type: GrantFiled: August 2, 2019Date of Patent: September 26, 2023Assignees: VOLKSWAGEN AKTIENGESELLSCHAFT, PORSCHE AGInventors: Joerg Christian Wolf, Elnaz Vahedforough, James Phan Bui, Bryan Grant, Martin Fest, Nikhil George
-
Patent number: 11693417Abstract: A method includes generating a first simulated environment. The first simulated environment includes a route for a simulated vehicle. The method includes determining a set of locations within the first simulated environment for a set of objects. The method includes determining a path for the simulated vehicle based on the route and set of locations. The method includes generating a set of simulated environments based on the first simulated environment and set of locations. The method includes generating a set of images based on the set of simulated environments, the path, and the set of non-deterministically generated objects. The non-deterministically generated objects include unrealistic objects and optionally include realistic objects. The method includes training vehicle guidance models using the set of images which may include abstract or unrealistic objects. The trained vehicle guidance models may be directly used on real vehicles in corresponding real world environments.Type: GrantFiled: March 14, 2020Date of Patent: July 4, 2023Assignees: VOLKSWAGEN AKTIENGESELLSCHAFT, DR. ING H.C. F. PORSCHE AKTIENGESELLSCHAFT, AUDI AGInventors: Nikhil George, Samira Pouyanfar, Muneeb Saleem, Elnaz Vahedforough, Samuel Zeitvogel
-
Patent number: 11584342Abstract: Devices, systems, and methods related to prediction of tire performance using existing CAN data to improve overall vehicle performance. Machine learning tools are applied to CAN data, for example pilot data and/or vehicle dynamics data, to predict tire performance factors for use in a vehicle control system to provide vehicle lateral guidance control.Type: GrantFiled: October 28, 2019Date of Patent: February 21, 2023Inventors: Mohak Bhimani, Sai Prasad Nooka, Nikhil George
-
Publication number: 20210383209Abstract: In one embodiment, a method includes obtaining candidate data generated by a vehicle. The candidate data comprises a subset of sensor data identified based on a set of neural network models executing on the vehicle. The method also includes determining whether the candidate data can be associated with one or more categories of a set of categories for training data based on a set of categorization models. The method further includes associating the candidate data with the first category in response to determining that the candidate data can be associated with at a first category of the set of categories. The method further includes determining whether the candidate data can be associated with a second category. The set of categories lacks the second category. The method further includes including the second category in the set of categories in response to determining that the candidate data can be associated with the second category.Type: ApplicationFiled: June 9, 2020Publication date: December 9, 2021Inventors: Pratik BRAHMA, Nikhil GEORGE, Oleg ZABLUDA
-
Publication number: 20210122340Abstract: Devices, systems, and methods related to prediction of tire performance using existing CAN data to improve overall vehicle performance. Machine learning tools are applied to CAN data, for example pilot data and/or vehicle dynamics data, to predict tire performance factors for use in a vehicle control system to provide vehicle lateral guidance control.Type: ApplicationFiled: October 28, 2019Publication date: April 29, 2021Inventors: Mohak BHIMANI, Sai Prasad NOOKA, Nikhil GEORGE
-
Publication number: 20210073626Abstract: A computing system comprises a data storage and at least one processor communicatively coupled to the data storage. The at least one processor is configured to execute program instructions to cause the system to perform the following steps. A deep neural network (“DNN”) model is trained using training data. Next, additional scenes are determined based on the DNN model and the training data. The determined scenes are generated, and then used to augment the training dataset. The DNN model is then retrained using the augmented training dataset and stored in a data storage for deployment.Type: ApplicationFiled: September 6, 2019Publication date: March 11, 2021Inventors: Pratik Prabhanjan Brahma, Nasim Souly, Nikhil George
-
Publication number: 20210031734Abstract: A vehicle attachment for guiding a vehicle includes a magnetic tape sensor, at least one sensor, a controller, at least one coupling device for attachment to the vehicle, and a vehicle interface system. The magnetic tape sensor is configured to detect a path. The at least one sensor can detect whether there are any obstructions along the path. The controller is configured to steer the vehicle along the predefined path and to adjust the speed of the vehicle to avoid coming in contact with any obstructions. The vehicle interface system is configured to communicatively couple the controller to at least one electronic control unit of the vehicle.Type: ApplicationFiled: August 2, 2019Publication date: February 4, 2021Inventors: Joerg Christian WOLF, Elnaz VAHEDFOROUGH, James Phan BUI, Bryan GRANT, Martin FEST, Nikhil GEORGE
-
Publication number: 20200293054Abstract: In one embodiment, a method is provided. The method includes generating a first simulated environment. The first simulated environment includes a route for a simulated vehicle. The method also includes determining a set of locations within the first simulated environment for a set of objects. The method further includes determining a path for the simulated vehicle based on the route and the set of locations. The method further includes generating a set of simulated environments based on the first simulated environment and the set of locations. The method further includes generating a set of images based on the set of simulated environments, the path, and the set of non-deterministically generated objects. The non-deterministically generated objects include unrealistic objects and optionally include realistic objects. The method further includes training vehicle guidance models using the set of images which may include abstract or unrealistic objects.Type: ApplicationFiled: March 14, 2020Publication date: September 17, 2020Inventors: Nikhil GEORGE, Samira POUYANFAR, Muneeb SALEEM, Elnaz VAHEDFOROUGH, Samuel ZEITVOGEL
-
Publication number: 20190325157Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by using a slave device that will enable or disable protection for applications as required. The device supports one or more users, none or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges the processes running in that Application Security Environment have while that Application Security Environment is in that state.Type: ApplicationFiled: June 9, 2019Publication date: October 24, 2019Inventors: George Madathilparambil George, Nikhil George
-
Patent number: 10372924Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by using a slave device that will enable or disable protection for applications as required. The device supports one or more users, none or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges the processes running in that Application Security Environment have while that Application Security Environment is in that state.Type: GrantFiled: May 12, 2008Date of Patent: August 6, 2019Inventors: George Madathilparambil George, Nikhil George
-
Patent number: 8443451Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by adding a device that will enable or disable protection for applications as required. The device supports one or more users, one or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges for processes running in that Application Security Environment while that Application Security Environment is in that state.Type: GrantFiled: March 27, 2008Date of Patent: May 14, 2013Inventors: George Madathilparambil George, Nikhil George
-
Publication number: 20100023522Abstract: A high level of computer security can be achieved by controlling read/write/execute access to files, controlling incoming or outgoing network connections, controlling incoming or outgoing network traffic and controlling privileged operations based on states of Application Security Environments and/or based on states of users or groups of users and/or based on states of privilege objects. These states can be controlled dynamically by software or by one or more hardware devices.Type: ApplicationFiled: July 18, 2008Publication date: January 28, 2010Inventors: George Madathilparambil George, Nikhil George
-
Publication number: 20090328155Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by using a slave device that will enable or disable protection for applications as required. The device supports one or more users, none or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges the processes running in that Application Security Environment have while that Application Security Environment is in that state.Type: ApplicationFiled: May 12, 2008Publication date: December 31, 2009Inventors: George Madathilparamgil George, Nikhil George
-
Publication number: 20090260050Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by adding a device capable of user authentication that will enable or disable protection for applications as required. The device supports one or more users, none or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges for processes running in that Application Security Environment while that Application Security Environment is in that state.Type: ApplicationFiled: April 14, 2008Publication date: October 15, 2009Inventors: George Madathilparambil George, Nikhil George
-
Publication number: 20090249435Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by adding a device that will enable or disable protection for applications as required. The device supports one or more users, one or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges for processes running in that Application Security Environment while that Application Security Environment is in that state.Type: ApplicationFiled: March 27, 2008Publication date: October 1, 2009Inventors: George Madathilparambil George, Nikhil George
-
Patent number: 7523281Abstract: Data protection is weak with the methods currently available and there are risks of corrupting important data, including system data accidentally by users or by malicious programs. We are proposing a method for improving access protection, more particularly, protection for data on mass memories by adding a hardware that will enable or disable read or write protection to portions of mass memories for each user. The hardware supports one or more users and two or more states for each supported user. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to a user corresponds to disabling or enabling read or write protection to some portions of a mass memory or mass memories for that user.Type: GrantFiled: September 6, 2006Date of Patent: April 21, 2009Inventors: George Madathilparambil George, Nikhil George
-
Publication number: 20080066183Abstract: Data protection is weak with the methods currently available and there are risks of corrupting important data, including system data accidentally by users or by malicious programs. We are proposing a method for improving access protection, more particularly, protection for data on mass memories by adding a hardware that will enable or disable read or write protection to portions of mass memories for each user. The hardware supports one or more users and two or more states for each supported user. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to a user corresponds to disabling or enabling read or write protection to some portions of a mass memory or mass memories for that user.Type: ApplicationFiled: September 12, 2006Publication date: March 13, 2008Inventors: George Madathilparambil George, Nikhil George