Patents by Inventor Pankaj Mohan
Pankaj Mohan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9959148Abstract: Embodiments of the present disclosure disclose a method and a device for estimating optimal resources for server virtualization. The method comprises receiving input data relating to requirements of server virtualization from a user device. The method further comprises filtering the input data by applying filtering rules. The method further comprises generating current landscape information of a plurality of servers using the filtered input data. The method further comprises determining values of virtualization parameters for a plurality of target servers using the current landscape information and predefined rules. The method further comprises determining landscape information of the plurality of target servers using the current landscape information and the values of virtualization parameters for estimating optimal resources for server virtualization.Type: GrantFiled: March 26, 2015Date of Patent: May 1, 2018Assignee: WIPRO LIMITEDInventors: Suresh Kakkar, Vasudha Mishra, Pankaj Mohan Dixit
-
Patent number: 9513334Abstract: A method for performing on-chip spatial debugging of a user circuit programmed into a user-programmable integrated circuit includes halting an internal clock driving synchronous logic elements in the integrated circuit and reading the states of all synchronous logic elements programmed into the integrated circuit while the internal clock is halted. An interrupt to an embedded processor in the integrated circuit running a user application can also be generated. The output of at least one synchronous logic element can be forced to a desired state while the internal clock is halted. The clock can then be restarted or stepped.Type: GrantFiled: March 14, 2014Date of Patent: December 6, 2016Assignee: Microsemi SoC CorporationInventors: Pankaj Mohan Shanker, Ming-Hoe Kiu, Mikhail Ivanovich Chukhlebov
-
Publication number: 20160234130Abstract: Embodiments of the present disclosure disclose a method and a device for estimating optimal resources for server virtualization. The method comprises receiving input data relating to requirements of server virtualization from a user device. The method further comprises filtering the input data by applying filtering rules. The method further comprises generating current landscape information of a plurality of servers using the filtered input data. The method further comprises determining values of virtualization parameters for a plurality of target servers using the current landscape information and predefined rules. The method further comprises determining landscape information of the plurality of target servers using the current landscape information and the values of virtualization parameters for estimating optimal resources for server virtualization.Type: ApplicationFiled: March 26, 2015Publication date: August 11, 2016Applicant: WIPRO LIMITEDInventors: Suresh KAKKAR, Vasudha MISHRA, Pankaj Mohan DIXIT
-
Patent number: 9061373Abstract: A component of an implantable medical device may include a first member, a second member, and a composite seam weld formed between the first member and the second member. In some examples, the composite seam weld includes a continuous wave (CW)-welded portion formed using CW welding and a pulse-welded portion formed using pulsed welding. A first end of the pulse-welded portion may partially overlap a first end of the CW-welded portion and may be offset from the first end of the CW-welded portion in a direction substantially perpendicular to a longitudinal orientation of the first end of the CW-welded portion. Techniques for forming composite seam welds are also described.Type: GrantFiled: May 22, 2012Date of Patent: June 23, 2015Assignee: Medtronic, Inc.Inventors: Pankaj Mohan, David J. Buendorf, Jeffrey J. Louwagie
-
Publication number: 20140281775Abstract: A method for performing on-chip spatial debugging of a user circuit programmed into a user-programmable integrated circuit includes halting an internal clock driving synchronous logic elements in the integrated circuit and reading the states of all synchronous logic elements programmed into the integrated circuit while the internal clock is halted. An interrupt to an embedded processor in the integrated circuit running a user application can also be generated. The output of at least one synchronous logic element can be forced to a desired state while the internal clock is halted. The clock can then be restarted or stepped.Type: ApplicationFiled: March 14, 2014Publication date: September 18, 2014Applicant: Microsemi SoC CorporationInventors: Pankaj Mohan Shanker, Ming-Hoe Kiu, Mikhail Ivanovich Chukhlebov
-
Patent number: 8505068Abstract: The present invention extends to methods, systems, and computer program products for deriving express rights in protected content. Embodiments of the invention provide mechanisms to convert implicit rights to express rights for entities, including applications, inside and outside of an organizational (e.g., enterprise) boundary. The conversion can occur dynamically, based on the information protection policies defined by a policy administrator, granting entities express access to perform tasks on protected content.Type: GrantFiled: September 29, 2010Date of Patent: August 6, 2013Assignee: Microsoft CorporationInventors: Tejas D. Patel, Gregory Kostal, Yuhui Zhong, Vladimir Yarmolenko, Pankaj Mohan Kamat, Krassimir E. Karamfilov
-
Publication number: 20130136979Abstract: A component of an implantable medical device may include a first member, a second member, and a composite seam weld formed between the first member and the second member. In some examples, the composite seam weld includes a continuous wave (CW)-welded portion formed using CW welding and a pulse-welded portion formed using pulsed welding. A first end of the pulse-welded portion may partially overlap a first end of the CW-welded portion and may be offset from the first end of the CW-welded portion in a direction substantially perpendicular to a longitudinal orientation of the first end of the CW-welded portion. Techniques for forming composite seam welds are also described.Type: ApplicationFiled: May 22, 2012Publication date: May 30, 2013Applicant: MEDTRONIC, INC.Inventors: Pankaj Mohan, David J. Buendorf, Jeffrey J. Louwagie
-
Patent number: 8448228Abstract: The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate.Type: GrantFiled: September 29, 2010Date of Patent: May 21, 2013Assignee: Microsoft CorporationInventors: Yuhui Zhong, Gregory Kostal, Tejas D. Patel, Scott C. Cottrille, Vladimir Yarmolenko, Pankaj Mohan Kamat, Sunitha Samuel, Frank D. Byrum, Mayank Mehta, Chandresh Kumar Jain, Edward Banti
-
Publication number: 20120107677Abstract: An energy storage device may include a housing and a fluid access aperture extending through a sidewall of housing that is used to fill the device with electrolytic fluid. In some examples, the fluid access aperture may define a length extending through the housing that is greater than a major width that extends across a cross-sectional area of the fluid access aperture. In some additional examples, the fluid access aperture may be angled relative to an axis that is substantially orthogonal to the housing. Depending on the situation, such example fluid access apertures may prevent electrolytic fluid from escaping from the energy storage device while the fluid access aperture is being sealed.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: MEDTRONIC, INC.Inventors: Afsar M. Ali, David P. Guy, Jason T. Papenfuss, Pankaj Mohan
-
Publication number: 20120079557Abstract: The present invention extends to methods, systems, and computer program products for deriving express rights in protected content. Embodiments of the invention provide mechanisms to convert implicit rights to express rights for entities, including applications, inside and outside of an organizational (e.g., enterprise) boundary. The conversion can occur dynamically, based on the information protection policies defined by a policy administrator, granting entities express access to perform tasks on protected content.Type: ApplicationFiled: September 29, 2010Publication date: March 29, 2012Applicant: Microsoft CorporationInventors: Tejas D. Patel, Gregory Kostal, Yuhui Zhong, Vladimir Yarmolenko, Pankaj Mohan Kamat, Krassimir E. Karamfilov
-
Publication number: 20120079268Abstract: The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate.Type: ApplicationFiled: September 29, 2010Publication date: March 29, 2012Applicant: Microsoft CorporationInventors: Yuhui Zhong, Gregory Kostal, Tejas D. Patel, Scott C. Cottrille, Vladimir Yarmolenko, Pankaj Mohan Kamat, Sunitha Samuel, Frank D. Byrum, Mayank Mehta, Chandresh Kumar Jain, Edward Banti
-
Patent number: 7987496Abstract: The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content.Type: GrantFiled: April 11, 2008Date of Patent: July 26, 2011Assignee: Microsoft CorporationInventors: Duncan G. Bryce, Scott C. Cottrille, Pankaj Mohan Kamat, Krassimir Karamfilov, Gregory Kostal, Kenneth D. Ray, Vladimir Yarmolenko, Yuhui Zhong
-
Publication number: 20100304213Abstract: A method of manufacturing an energy storage device for a medical device includes enclosing a cell assembly in a case. The case includes a filling aperture. The filling aperture includes an inner surface that is integral to the case so as to be monolithic. The case is free of a separate fill port tube. Moreover, the method includes introducing an electrolyte into the case through the filling aperture and hermetically sealing the filling aperture to form a first seal of the filling aperture that is free of a filler material. The method additionally includes hermetically sealing the sealing member to the case to form a second seal of the filling aperture.Type: ApplicationFiled: November 18, 2009Publication date: December 2, 2010Applicant: MEDTRONIC, INC.Inventors: Stephanie Breimon, Stephen Daniel Arco, Bernard Frank Heller, JR., Pankaj Mohan, Walter C. Sunderland, Paul M. Boucher, Jeffrey J. Louwagie
-
Publication number: 20090260054Abstract: The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content.Type: ApplicationFiled: April 11, 2008Publication date: October 15, 2009Applicant: MICROSOFT CORPORATIONInventors: Duncan G. Bryce, Scott C. Cottrille, Pankaj Mohan Kamat, Krassimir Karamfilov, Gregory Kostal, Kenneth D. Ray, Vladimir Yarmolenko, Yuhui Zhong
-
Publication number: 20090208015Abstract: The offline consumption and publication of protected information in a networked environment. The offline consumption of protected information is accomplished by having the consuming user maintain a store of asymmetric encryption keys. The protected information is encrypted by the publishing user using a symmetric key and the symmetric key is then encrypted using a public asymmetric key associated with the consuming user. The consuming user received the protected information and a usage policy containing the encrypted symmetric key. The consuming user verifies that it can decrypt the symmetric key using a private asymmetric key maintained by the consumer. The user then decrypts the symmetric key and accesses the content of the protected information.Type: ApplicationFiled: February 15, 2008Publication date: August 20, 2009Applicant: MICROSOFT CORPORATIONInventors: Pankaj Mohan Kamat, Duncan G. Bryce, Scott C. Cottrille, Gregory Kostal