Patents by Inventor Pankaj Mohan

Pankaj Mohan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9959148
    Abstract: Embodiments of the present disclosure disclose a method and a device for estimating optimal resources for server virtualization. The method comprises receiving input data relating to requirements of server virtualization from a user device. The method further comprises filtering the input data by applying filtering rules. The method further comprises generating current landscape information of a plurality of servers using the filtered input data. The method further comprises determining values of virtualization parameters for a plurality of target servers using the current landscape information and predefined rules. The method further comprises determining landscape information of the plurality of target servers using the current landscape information and the values of virtualization parameters for estimating optimal resources for server virtualization.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: May 1, 2018
    Assignee: WIPRO LIMITED
    Inventors: Suresh Kakkar, Vasudha Mishra, Pankaj Mohan Dixit
  • Patent number: 9513334
    Abstract: A method for performing on-chip spatial debugging of a user circuit programmed into a user-programmable integrated circuit includes halting an internal clock driving synchronous logic elements in the integrated circuit and reading the states of all synchronous logic elements programmed into the integrated circuit while the internal clock is halted. An interrupt to an embedded processor in the integrated circuit running a user application can also be generated. The output of at least one synchronous logic element can be forced to a desired state while the internal clock is halted. The clock can then be restarted or stepped.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: December 6, 2016
    Assignee: Microsemi SoC Corporation
    Inventors: Pankaj Mohan Shanker, Ming-Hoe Kiu, Mikhail Ivanovich Chukhlebov
  • Publication number: 20160234130
    Abstract: Embodiments of the present disclosure disclose a method and a device for estimating optimal resources for server virtualization. The method comprises receiving input data relating to requirements of server virtualization from a user device. The method further comprises filtering the input data by applying filtering rules. The method further comprises generating current landscape information of a plurality of servers using the filtered input data. The method further comprises determining values of virtualization parameters for a plurality of target servers using the current landscape information and predefined rules. The method further comprises determining landscape information of the plurality of target servers using the current landscape information and the values of virtualization parameters for estimating optimal resources for server virtualization.
    Type: Application
    Filed: March 26, 2015
    Publication date: August 11, 2016
    Applicant: WIPRO LIMITED
    Inventors: Suresh KAKKAR, Vasudha MISHRA, Pankaj Mohan DIXIT
  • Patent number: 9061373
    Abstract: A component of an implantable medical device may include a first member, a second member, and a composite seam weld formed between the first member and the second member. In some examples, the composite seam weld includes a continuous wave (CW)-welded portion formed using CW welding and a pulse-welded portion formed using pulsed welding. A first end of the pulse-welded portion may partially overlap a first end of the CW-welded portion and may be offset from the first end of the CW-welded portion in a direction substantially perpendicular to a longitudinal orientation of the first end of the CW-welded portion. Techniques for forming composite seam welds are also described.
    Type: Grant
    Filed: May 22, 2012
    Date of Patent: June 23, 2015
    Assignee: Medtronic, Inc.
    Inventors: Pankaj Mohan, David J. Buendorf, Jeffrey J. Louwagie
  • Publication number: 20140281775
    Abstract: A method for performing on-chip spatial debugging of a user circuit programmed into a user-programmable integrated circuit includes halting an internal clock driving synchronous logic elements in the integrated circuit and reading the states of all synchronous logic elements programmed into the integrated circuit while the internal clock is halted. An interrupt to an embedded processor in the integrated circuit running a user application can also be generated. The output of at least one synchronous logic element can be forced to a desired state while the internal clock is halted. The clock can then be restarted or stepped.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 18, 2014
    Applicant: Microsemi SoC Corporation
    Inventors: Pankaj Mohan Shanker, Ming-Hoe Kiu, Mikhail Ivanovich Chukhlebov
  • Patent number: 8505068
    Abstract: The present invention extends to methods, systems, and computer program products for deriving express rights in protected content. Embodiments of the invention provide mechanisms to convert implicit rights to express rights for entities, including applications, inside and outside of an organizational (e.g., enterprise) boundary. The conversion can occur dynamically, based on the information protection policies defined by a policy administrator, granting entities express access to perform tasks on protected content.
    Type: Grant
    Filed: September 29, 2010
    Date of Patent: August 6, 2013
    Assignee: Microsoft Corporation
    Inventors: Tejas D. Patel, Gregory Kostal, Yuhui Zhong, Vladimir Yarmolenko, Pankaj Mohan Kamat, Krassimir E. Karamfilov
  • Publication number: 20130136979
    Abstract: A component of an implantable medical device may include a first member, a second member, and a composite seam weld formed between the first member and the second member. In some examples, the composite seam weld includes a continuous wave (CW)-welded portion formed using CW welding and a pulse-welded portion formed using pulsed welding. A first end of the pulse-welded portion may partially overlap a first end of the CW-welded portion and may be offset from the first end of the CW-welded portion in a direction substantially perpendicular to a longitudinal orientation of the first end of the CW-welded portion. Techniques for forming composite seam welds are also described.
    Type: Application
    Filed: May 22, 2012
    Publication date: May 30, 2013
    Applicant: MEDTRONIC, INC.
    Inventors: Pankaj Mohan, David J. Buendorf, Jeffrey J. Louwagie
  • Patent number: 8448228
    Abstract: The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate.
    Type: Grant
    Filed: September 29, 2010
    Date of Patent: May 21, 2013
    Assignee: Microsoft Corporation
    Inventors: Yuhui Zhong, Gregory Kostal, Tejas D. Patel, Scott C. Cottrille, Vladimir Yarmolenko, Pankaj Mohan Kamat, Sunitha Samuel, Frank D. Byrum, Mayank Mehta, Chandresh Kumar Jain, Edward Banti
  • Publication number: 20120107677
    Abstract: An energy storage device may include a housing and a fluid access aperture extending through a sidewall of housing that is used to fill the device with electrolytic fluid. In some examples, the fluid access aperture may define a length extending through the housing that is greater than a major width that extends across a cross-sectional area of the fluid access aperture. In some additional examples, the fluid access aperture may be angled relative to an axis that is substantially orthogonal to the housing. Depending on the situation, such example fluid access apertures may prevent electrolytic fluid from escaping from the energy storage device while the fluid access aperture is being sealed.
    Type: Application
    Filed: October 28, 2010
    Publication date: May 3, 2012
    Applicant: MEDTRONIC, INC.
    Inventors: Afsar M. Ali, David P. Guy, Jason T. Papenfuss, Pankaj Mohan
  • Publication number: 20120079557
    Abstract: The present invention extends to methods, systems, and computer program products for deriving express rights in protected content. Embodiments of the invention provide mechanisms to convert implicit rights to express rights for entities, including applications, inside and outside of an organizational (e.g., enterprise) boundary. The conversion can occur dynamically, based on the information protection policies defined by a policy administrator, granting entities express access to perform tasks on protected content.
    Type: Application
    Filed: September 29, 2010
    Publication date: March 29, 2012
    Applicant: Microsoft Corporation
    Inventors: Tejas D. Patel, Gregory Kostal, Yuhui Zhong, Vladimir Yarmolenko, Pankaj Mohan Kamat, Krassimir E. Karamfilov
  • Publication number: 20120079268
    Abstract: The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate.
    Type: Application
    Filed: September 29, 2010
    Publication date: March 29, 2012
    Applicant: Microsoft Corporation
    Inventors: Yuhui Zhong, Gregory Kostal, Tejas D. Patel, Scott C. Cottrille, Vladimir Yarmolenko, Pankaj Mohan Kamat, Sunitha Samuel, Frank D. Byrum, Mayank Mehta, Chandresh Kumar Jain, Edward Banti
  • Patent number: 7987496
    Abstract: The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content.
    Type: Grant
    Filed: April 11, 2008
    Date of Patent: July 26, 2011
    Assignee: Microsoft Corporation
    Inventors: Duncan G. Bryce, Scott C. Cottrille, Pankaj Mohan Kamat, Krassimir Karamfilov, Gregory Kostal, Kenneth D. Ray, Vladimir Yarmolenko, Yuhui Zhong
  • Publication number: 20100304213
    Abstract: A method of manufacturing an energy storage device for a medical device includes enclosing a cell assembly in a case. The case includes a filling aperture. The filling aperture includes an inner surface that is integral to the case so as to be monolithic. The case is free of a separate fill port tube. Moreover, the method includes introducing an electrolyte into the case through the filling aperture and hermetically sealing the filling aperture to form a first seal of the filling aperture that is free of a filler material. The method additionally includes hermetically sealing the sealing member to the case to form a second seal of the filling aperture.
    Type: Application
    Filed: November 18, 2009
    Publication date: December 2, 2010
    Applicant: MEDTRONIC, INC.
    Inventors: Stephanie Breimon, Stephen Daniel Arco, Bernard Frank Heller, JR., Pankaj Mohan, Walter C. Sunderland, Paul M. Boucher, Jeffrey J. Louwagie
  • Publication number: 20090260054
    Abstract: The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content.
    Type: Application
    Filed: April 11, 2008
    Publication date: October 15, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Duncan G. Bryce, Scott C. Cottrille, Pankaj Mohan Kamat, Krassimir Karamfilov, Gregory Kostal, Kenneth D. Ray, Vladimir Yarmolenko, Yuhui Zhong
  • Publication number: 20090208015
    Abstract: The offline consumption and publication of protected information in a networked environment. The offline consumption of protected information is accomplished by having the consuming user maintain a store of asymmetric encryption keys. The protected information is encrypted by the publishing user using a symmetric key and the symmetric key is then encrypted using a public asymmetric key associated with the consuming user. The consuming user received the protected information and a usage policy containing the encrypted symmetric key. The consuming user verifies that it can decrypt the symmetric key using a private asymmetric key maintained by the consumer. The user then decrypts the symmetric key and accesses the content of the protected information.
    Type: Application
    Filed: February 15, 2008
    Publication date: August 20, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Pankaj Mohan Kamat, Duncan G. Bryce, Scott C. Cottrille, Gregory Kostal