Patents by Inventor Piyush Patel
Piyush Patel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240330562Abstract: A plurality of design iterations are executed for a flow to design a circuit. The design flow includes a sequence of at least two stages. Each stage produces an output design of the circuit from an input design of the circuit, in accordance with parameters for that stage. The design iterations select parameter values for slices of one or more stages of the design flow. In the design iterations for at least one of the slices, parameter values for a non-final stage of the design flow are selected based on a final quality of result (QoR) of the design flow. The design iterations for this slice are adapted based on final QoRs produced by the design iterations.Type: ApplicationFiled: March 29, 2023Publication date: October 3, 2024Inventors: Piyush Verma, Joseph Robb Walston, Robert Lawrence Walker, Pranay Prakash, Jagat Patel, Mark Thomas Williams, Navneedh Shivakumar Maudgalya, Benoit Claudel
-
Patent number: 12107828Abstract: A cloud network for delivering local content to a user at a user location. The cloud network includes a client device comprising a local application, a mid-link server and a cloud provider. The mid-link server receives from the client device a request for local data from the user at the user location. The user has provided the request for the local data from the user location without a data center. A sub-data center for the user location is identified and assigned an Internet Protocol (IP) address for the user location. The sub-data center is a data center nearest to the user location. Each data center has IP addresses for different locations to deliver the local content to the respective IP address for the location. The request is routed to the sub-data center which is used to provide the local data to the user by the cloud provider.Type: GrantFiled: December 5, 2023Date of Patent: October 1, 2024Assignee: Netskope, Inc.Inventors: Jason Hofmann, Jason Eggleston, Piyush Patel, Lonhyn T. Jasinskyj
-
Publication number: 20240281285Abstract: Systems and methods for secure resource management are provided. A secure resource management system receives from a client computing system associated with a resource provider a query for classifying a resource user associated with the resource provider. The secure resource management system determining a set of resource abuser criteria for classifying the resource user as a resource abuser. The secure resource management system determines that the resource user is a resource abuser or a potential resource abuser based on the set of resource abuser criteria and a resource transaction history associated with the resource user. Based on determining that the resource user is a resource abuser or a potential resource abuser, the secure resource management system generates and transmits a response to the query to the client computing system. The response can be used to restrict or deny access to the resource by the resource user.Type: ApplicationFiled: April 24, 2024Publication date: August 22, 2024Inventors: Ligaj PRADHAN, Piyush PATEL, Rajkumar BONDUGULA
-
Publication number: 20240267746Abstract: A method includes receiving node-site planning data from a first-party application; validating the node-site planning data based on one or more parameters of validation; pre-loading at least a portion of the node-site planning data on a second-party application for field-survey data gathering; and receiving field-survey data from the second-party application.Type: ApplicationFiled: September 23, 2022Publication date: August 8, 2024Inventors: Praveen N YADAV, Piyush PATEL, Harsh MATHUR
-
Publication number: 20240220716Abstract: Provided herein are methods, apparatuses, systems, and computer-readable storage media for generating a report by a workflow management service (WMS) of a business intelligence (BI) platform. In an embodiment, a method includes determining, based on a workflow of the BI platform, that the report is to be generated. The method further includes obtaining a report connector configuration corresponding to the report. The method further includes identifying a report template corresponding to the report connector configuration. The method further includes customizing the report template using the report connector configuration, resulting in a customized report template. The method further includes instructing a first service to generate the report using the customized report template. The method further includes reporting a progress status of the report based on request response information received from the first service.Type: ApplicationFiled: May 23, 2022Publication date: July 4, 2024Applicant: RAKUTEN SYMPHONY SINGAPORE PTE. LTD.Inventors: Vipul CHOURE, Piyush PATEL
-
Publication number: 20240187377Abstract: A cloud network for delivering local content to a user at a user location. The cloud network includes a client device comprising a local application, a mid-link server and a cloud provider. The mid-link server receives from the client device a request for local data from the user at the user location. The user has provided the request for the local data from the user location without a data center. A sub-data center for the user location is identified and assigned an Internet Protocol (IP) address for the user location. The sub-data center is a data center nearest to the user location. Each data center has IP addresses for different locations to deliver the local content to the respective IP address for the location. The request is routed to the sub-data center which is used to provide the local data to the user by the cloud provider.Type: ApplicationFiled: December 5, 2023Publication date: June 6, 2024Applicant: Netskope, Inc.Inventors: Jason Hofmann, Jason Eggleston, Piyush Patel, Lonhyn T. Jasinskyj
-
Publication number: 20240187438Abstract: An Internet Protocol (IP) address assignment method in a cloud-based multi-tenant system for assigning unique IP addresses to a plurality of client devices of a plurality of users. Network traffic including a data request from a client device to a cloud provider via an ingress tunnel is monitored by a mid-link server. A user of the client device is identified from the data request. A policy is identified based on the tenant of the user and a plurality of applications for the client device. An IP address is assigned to the client device of the user based on the policy. Each client device is assigned a unique IP address. The network traffic egresses via an egress tunnel from the mid-link server. The data request is routed from the client device to the cloud provider using the IP address of the client device.Type: ApplicationFiled: December 5, 2023Publication date: June 6, 2024Applicant: Netskope, Inc.Inventors: Jason Hofmann, Jason Eggleston, Piyush Patel, Lonhyn T. Jasinskyj
-
Patent number: 11995470Abstract: Systems and methods for secure resource management are provided. A secure resource management system receives from a client computing system associated with a resource provider a query for classifying a resource user associated with the resource provider. The secure resource management system determining a set of resource abuser criteria for classifying the resource user as a resource abuser. The secure resource management system determines that the resource user is a resource abuser or a potential resource abuser based on the set of resource abuser criteria and a resource transaction history associated with the resource user. Based on determining that the resource user is a resource abuser or a potential resource abuser, the secure resource management system generates and transmits a response to the query to the client computing system. The response can be used to restrict or deny access to the resource by the resource user.Type: GrantFiled: September 3, 2020Date of Patent: May 28, 2024Assignee: Equifax Inc.Inventors: Ligaj Pradhan, Piyush Patel, Rajkumar Bondugula
-
Publication number: 20240091199Abstract: Deuterated domperidone compositions, methods of synthesis, methods of use, and dosing formulations providing beneficial safety and other effects.Type: ApplicationFiled: June 20, 2022Publication date: March 21, 2024Applicant: CinDome Pharma, Inc.Inventors: Catherine PEARCE, Jon ISAACSOHN, Piyush PATEL
-
Publication number: 20240078131Abstract: Systems and methods are directed to methods and apparatus for transferring ownership of common resources from a source entity, which owns a resource, to a destination entity, which will own the resource, in a distributed system. The method includes the source entity receiving a command to change ownership (the MOVE command), and then marking the source entity as no longer owning the common resource. The source entity then sends a MOVE command to the destination entity, which will then update its common resource ownership table to reflect that the ownership of the common resource has been transferred from the source entity to the destination entity. It is advantageous that the updating of ownership of the common resource in the source entity occur simultaneously with the dispatching of the MOVE command to the destination entity.Type: ApplicationFiled: April 26, 2023Publication date: March 7, 2024Inventors: Piyush PATEL, Kevin MANN, Theodore HAGGIS, Malvika SINGH, Mit KUTCHI
-
Patent number: 11893493Abstract: In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided. A dataset used for training a neural network model configured can be clustered into a first set of clusters and a second set of clusters. The neural network model can be constructed with a number of nodes in a hidden layer that is based on the number of clusters in the first set of clusters. The neural network can be trained based on training samples selected from the second set of clusters. In some aspects, the trained neural network model can be utilized to satisfy risk assessment queries to compute output risk indicators for target entities. The output risk indicator can be used to control access to one or more interactive computing environments by the target entities.Type: GrantFiled: September 20, 2022Date of Patent: February 6, 2024Assignee: EQUIFAX INC.Inventors: Rajkumar Bondugula, Piyush Patel
-
Patent number: 11894352Abstract: A power electronic module is provided that includes an electrical connection on opposing surfaces of an electronic component that allows a high current path from a top board to a bottom board through the body of the electronic component thus improving the power electronic module's electrical resistance and reducing the current load on the connector structure which is located between the first substrate and the second substrate. The power electronic module further includes a semiconductor component positioned on an external surface of the top board which allows for thermal contact of the semiconductor component with an external heat sink thus providing an efficient system thermal management via a reduced heat dissipation path. Additional heat dissipation can be obtained by disposing a metallic spacer on the semiconductor component of the power electronic module of the present disclosure.Type: GrantFiled: May 18, 2021Date of Patent: February 6, 2024Assignee: Renesas Electronics America Inc.Inventors: Sri Ganesh A Tharumalingam, Mark Kwoka, Viresh Piyush Patel, Peter Zhizheng Liu, Jeff Strang
-
Patent number: 11876807Abstract: In some aspects, a computing system can control access of a user computing device to a resource. The computing system can obtain an access request submitted by a user computing device. The computing system can verify permission information in the access request to determine that the access request is valid. If the access request is valid, the computing system submits an authentication request to request an authentication system to authenticate the user and obtains authentication results generated by the authentication system. The computing system further provides, based on the authentication results, an access control decision for the access request.Type: GrantFiled: April 14, 2022Date of Patent: January 16, 2024Assignee: Equifax Inc.Inventors: Rajkumar Bondugula, Piyush Patel, Samiyuru Geethanjana Senarathne Menik Hitihami Mudiyanselage
-
Publication number: 20230315328Abstract: Various embodiments include techniques for accessing extended memory in a parallel processing system via a high-bandwidth path to extended memory residing on a central processing unit. The disclosed extended memory system extends the directly addressable high-bandwidth memory local to a parallel processing system and avoids the performance penalties associated with low-bandwidth system memory. As a result, execution threads that are highly parallelizable and access a large memory space execute with increased performance on a parallel processing system relative to prior approaches.Type: ApplicationFiled: March 18, 2022Publication date: October 5, 2023Inventors: Hemayet HOSSAIN, Steven E. MOLNAR, Jonathon Stuart Ramsay EVANS, Wishwesh Anil GANDHI, Lacky V. SHAH, Vyas VENKATARAMAN, Mark HAIRGROVE, Geoffrey GERFIN, Jeffrey M. SMITH, Terje BERGSTROM, Vikram SETHI, Piyush PATEL
-
Patent number: 11640317Abstract: Systems and methods are directed to methods and apparatus for transferring ownership of common resources from a source entity, which owns a resource, to a destination entity, which will own the resource, in a distributed system. The method includes the source entity receiving a command to change ownership (the MOVE command), and then marking the source entity as no longer owning the common resource. The source entity then sends a MOVE command to the destination entity, which will then update its common resource ownership table to reflect that the ownership of the common resource has been transferred from the source entity to the destination entity. It is advantageous that the updating of ownership of the common resource in the source entity occur simultaneously with the dispatching of the MOVE command to the destination entity.Type: GrantFiled: March 11, 2019Date of Patent: May 2, 2023Assignee: Qualcomm IncorporatedInventors: Piyush Patel, Kevin Mann, Theodore Haggis, Malvika Singh, Mit Kutchi
-
Publication number: 20230008208Abstract: In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided. A dataset used for training a neural network model configured can be clustered into a first set of clusters and a second set of clusters. The neural network model can be constructed with a number of nodes in a hidden layer that is based on the number of clusters in the first set of clusters. The neural network can be trained based on training samples selected from the second set of clusters. In some aspects, the trained neural network model can be utilized to satisfy risk assessment queries to compute output risk indicators for target entities. The output risk indicator can be used to control access to one or more interactive computing environments by the target entities.Type: ApplicationFiled: September 20, 2022Publication date: January 12, 2023Inventors: Rajkumar BONDUGULA, Piyush PATEL
-
Publication number: 20220375909Abstract: A power electronic module is provided that includes an electrical connection on opposing surfaces of an electronic component that allows a high current path from a top board to a bottom board through the body of the electronic component thus improving the power electronic module's electrical resistance and reducing the current load on the connector structure which is located between the first substrate and the second substrate. The power electronic module further includes a semiconductor component positioned on an external surface of the top board which allows for thermal contact of the semiconductor component with an external heat sink thus providing an efficient system thermal management via a reduced heat dissipation path. Additional heat dissipation can be obtained by disposing a metallic spacer on the semiconductor component of the power electronic module of the present disclosure.Type: ApplicationFiled: May 18, 2021Publication date: November 24, 2022Applicant: Renesas Electronics America Inc.Inventors: Sri Ganesh A Tharumalingam, Mark Kwoka, Viresh Piyush Patel, Peter Zhizheng Liu, Jeff Strang
-
Patent number: 11475235Abstract: In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided. A dataset used for training a neural network model configured can be clustered into a first set of clusters and a second set of clusters. The neural network model can be constructed with a number of nodes in a hidden layer that is based on the number of clusters in the first set of clusters. The neural network can be trained based on training samples selected from the second set of clusters. In some aspects, the trained neural network model can be utilized to satisfy risk assessment queries to compute output risk indicators for target entities. The output risk indicator can be used to control access to one or more interactive computing environments by the target entities.Type: GrantFiled: May 15, 2020Date of Patent: October 18, 2022Assignee: EQUIFAX INC.Inventors: Rajkumar Bondugula, Piyush Patel
-
Publication number: 20220326997Abstract: Systems and methods for secure resource management are provided. A secure resource management system receives from a client computing system associated with a resource provider a query for classifying a resource user associated with the resource provider. The secure resource management system determining a set of resource abuser criteria for classifying the resource user as a resource abuser. The secure resource management system determines that the resource user is a resource abuser or a potential resource abuser based on the set of resource abuser criteria and a resource transaction history associated with the resource user. Based on determining that the resource user is a resource abuser or a potential resource abuser, the secure resource management system generates and transmits a response to the query to the client computing system. The response can be used to restrict or deny access to the resource by the resource user.Type: ApplicationFiled: September 3, 2020Publication date: October 13, 2022Inventors: Ligaj PRADHAN, Piyush PATEL, Rajkumar BONDUGULA
-
Publication number: 20220239665Abstract: In some aspects, a computing system can control access of a user computing device to a resource. The computing system can obtain an access request submitted by a user computing device. The computing system can verify permission information in the access request to determine that the access request is valid. If the access request is valid, the computing system submits an authentication request to request an authentication system to authenticate the user and obtains authentication results generated by the authentication system. The computing system further provides, based on the authentication results, an access control decision for the access request.Type: ApplicationFiled: April 14, 2022Publication date: July 28, 2022Inventors: Rajkumar BONDUGULA, Piyush PATEL, Samiyuru Geethanjana Senarathne MENIK HITIHAMI MUDIYANSELAGE