Patents by Inventor Pramod Sharma
Pramod Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240091953Abstract: A method for controlling a robotic system includes determining a location and/or a pose of a power system component based on data received from one or more sensors, and determining a mapping of a location of a robotic system within a model of an external environment of the robotic system based on the data. The model of the external environment provides locations of objects external to the robotic system. A sequence of movements of components of the robotic system is determined to perform maintenance on the power system component based on the locations of the objects external to the robotic system and/or the location or pose of the power system component. One or more control signals are communicated to remotely control movement of the components of the robotic system based on the sequence or movements of the components to perform maintenance on the power system component.Type: ApplicationFiled: November 30, 2023Publication date: March 21, 2024Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
-
Patent number: 11909769Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein. An example apparatus includes at least one memory, and at least one processor to execute instructions to at least identify one or more non-sensitive parameters of a plurality of policy parameters and one or more sensitive parameters of the plurality of the policy parameters, the plurality of the policy parameters obtained from a computing device in response to a request from a cloud analytics server for the plurality of the policy parameters, encrypt the one or more sensitive parameters to generate encrypted parameter data in response to the identification of the one or more sensitive parameters, and transmit the encrypted parameter data to the cloud analytics server, the cloud analytics server to curry a security policy function based on one or more of the plurality of the policy parameters.Type: GrantFiled: January 20, 2021Date of Patent: February 20, 2024Assignee: MUSARUBRA US LLCInventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
-
Publication number: 20240028350Abstract: An example machine learning or AI-driven method may include generating a document interface including a document content region configured to display textual and graphical document elements; that the document interface including a visualization input component that is user-selectable to input visualization object elements; providing the document interface for presentation via an output device of a computing device associated with a user; receiving a first input via an input device associated with the computing device; predicting one or more first visualization object elements based on the first input; and updating the document interface to include the one or more predicted first visualization object elements as one or more suggestions.Type: ApplicationFiled: October 15, 2021Publication date: January 25, 2024Inventors: Pramod Sharma, Jerome Scholler
-
Patent number: 11865732Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.Type: GrantFiled: April 30, 2021Date of Patent: January 9, 2024Assignee: Transportation IP Holdings, LLCInventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
-
Publication number: 20230151233Abstract: Digital ink formulations that cure by the application of light emitting diode (LED) energy are described. Also described are methods of bonding the LED-curable formulations onto substrates.Type: ApplicationFiled: April 9, 2021Publication date: May 18, 2023Inventors: Pramod SHARMA, Shawn ROBERTS, James DEININGER, Michelle PEARCE
-
Publication number: 20210252712Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.Type: ApplicationFiled: April 30, 2021Publication date: August 19, 2021Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
-
Publication number: 20210168176Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein. An example apparatus includes at least one memory, and at least one processor to execute instructions to at least identify one or more non-sensitive parameters of a plurality of policy parameters and one or more sensitive parameters of the plurality of the policy parameters, the plurality of the policy parameters obtained from a computing device in response to a request from a cloud analytics server for the plurality of the policy parameters, encrypt the one or more sensitive parameters to generate encrypted parameter data in response to the identification of the one or more sensitive parameters, and transmit the encrypted parameter data to the cloud analytics server, the cloud analytics server to curry a security policy function based on one or more of the plurality of the policy parameters.Type: ApplicationFiled: January 20, 2021Publication date: June 3, 2021Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
-
Patent number: 11020859Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.Type: GrantFiled: January 4, 2019Date of Patent: June 1, 2021Assignee: TRANSPORTATION IP HOLDINGS, LLCInventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
-
Patent number: 10911496Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein.Type: GrantFiled: August 12, 2019Date of Patent: February 2, 2021Assignee: MCAFEE, LLCInventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
-
Patent number: 10493629Abstract: A robotic system includes one or more optical sensors configured to separately obtain two dimensional (2D) image data and three dimensional (3D) image data of a brake lever of a vehicle, a manipulator arm configured to grasp the brake lever of the vehicle, and a controller configured to compare the 2D image data with the 3D image data to identify one or more of a location or a pose of the brake lever of the vehicle. The controller is configured to control the manipulator arm to move toward, grasp, and actuate the brake lever of the vehicle based on the one or more of the location or the pose of the brake lever.Type: GrantFiled: January 5, 2017Date of Patent: December 3, 2019Assignee: GE GLOBAL SOURCING LLCInventors: Arpit Jain, Charles Burton Theurer, Balajee Kannan, Shiraj Sen, Pramod Sharma, Shuai Li, Shubao Liu
-
Publication number: 20190364074Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein.Type: ApplicationFiled: August 12, 2019Publication date: November 28, 2019Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
-
Patent number: 10382489Abstract: Technologies for privacy-safe security policy evaluation include a cloud analytics server, a trusted data access mediator (TDAM) device, and one or more client devices. The cloud analytics server curries a security policy function to generate a privacy-safe curried function set. The cloud analytics server requests parameter data from the TDAM device, which collects the parameter data, identifies sensitive parameter data, encrypts the sensitive parameter data, and transmits the encrypted sensitive parameter data to the cloud analytics server. The cloud analytics server evaluates one or more curried functions using non-sensitive parameters to generate one or more sensitive functions that each take a sensitive parameter. The cloud analytics server transmits the sensitive functions and the encrypted sensitive parameters to a client computing device, which decrypts the encrypted sensitive parameters and evaluates the sensitive functions with the sensitive parameters to return a security policy.Type: GrantFiled: December 29, 2016Date of Patent: August 13, 2019Assignee: Mcafee, LLCInventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
-
Publication number: 20190134821Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.Type: ApplicationFiled: January 4, 2019Publication date: May 9, 2019Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
-
Publication number: 20180191780Abstract: Technologies for privacy-safe security policy evaluation include a cloud analytics server, a trusted data access mediator (TDAM) device, and one or more client devices. The cloud analytics server curries a security policy function to generate a privacy-safe curried function set. The cloud analytics server requests parameter data from the TDAM device, which collects the parameter data, identifies sensitive parameter data, encrypts the sensitive parameter data, and transmits the encrypted sensitive parameter data to the cloud analytics server. The cloud analytics server evaluates one or more curried functions using non-sensitive parameters to generate one or more sensitive functions that each take a sensitive parameter. The cloud analytics server transmits the sensitive functions and the encrypted sensitive parameters to a client computing device, which decrypts the encrypted sensitive parameters and evaluates the sensitive functions with the sensitive parameters to return a security policy.Type: ApplicationFiled: December 29, 2016Publication date: July 5, 2018Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
-
Publication number: 20170341236Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.Type: ApplicationFiled: October 13, 2016Publication date: November 30, 2017Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wheeler
-
Publication number: 20170341237Abstract: A robotic system includes one or more optical sensors configured to separately obtain two dimensional (2D) image data and three dimensional (3D) image data of a brake lever of a vehicle, a manipulator arm configured to grasp the brake lever of the vehicle, and a controller configured to compare the 2D image data with the 3D image data to identify one or more of a location or a pose of the brake lever of the vehicle. The controller is configured to control the manipulator arm to move toward, grasp, and actuate the brake lever of the vehicle based on the one or more of the location or the pose of the brake lever.Type: ApplicationFiled: January 5, 2017Publication date: November 30, 2017Inventors: Arpit Jain, Charles Burton Theurer, Balajee Kannan, Shiraj Sen, Pramod Sharma, Shuai Li, Shubao Liu
-
Patent number: 9596257Abstract: A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In practice, a shim application registers with a mobile device's operating system to intercept application installation operations. Upon intercepting an attempted installation operation, the shim application identifies the application seeking to be installed, generates a key uniquely identifying the application, and transmits the key over a network connection to a back-end server. The back-end server may be configured to crawl the Internet to identify malicious applications and compile and maintain a database of such applications. Upon receiving a key from the shim application, the back-end server can search its database to locate a matching application and, if found, respond to the mobile device with the application's status (e.g., malicious or not). The shim application can utilize this information to allow or block installation of the application.Type: GrantFiled: September 11, 2015Date of Patent: March 14, 2017Assignee: McAfee, Inc.Inventors: Sudeep Das, Jayasankar Divakarla, Pramod Sharma
-
Patent number: 9536057Abstract: Premise-based policies can be applied in the management of mobile devices and other computing devices within a system. A computing device is detected using close proximity wireless communication and location information is sent to the computing device using close proximity wireless communication. Policies applied to the computing device can be based at least in part on the location information.Type: GrantFiled: October 18, 2013Date of Patent: January 3, 2017Assignee: McAfee, Inc.Inventors: Sudeep Das, Pramod Sharma, Sumant Vashisth
-
Publication number: 20160006757Abstract: A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In practice, a shim application registers with a mobile device's operating system to intercept application installation operations. Upon intercepting an attempted installation operation, the shim application identifies the application seeking to be installed, generates a key uniquely identifying the application, and transmits the key over a network connection to a back-end server. The back-end server may be configured to crawl the Internet to identify malicious applications and compile and maintain a database of such applications. Upon receiving a key from the shim application, the back-end server can search its database to locate a matching application and, if found, respond to the mobile device with the application's status (e.g., malicious or not). The shim application can utilize this information to allow or block installation of the application.Type: ApplicationFiled: September 11, 2015Publication date: January 7, 2016Applicant: McAfee, Inc.Inventors: Sudeep Das, Jayasankar Divakarla, Pramod Sharma
-
Publication number: 20150381658Abstract: A tracking station detects a mobile data processing system (DPS) within communication range of a short range wireless module of the tracking station. In response to detecting the mobile DPS, the tracking station obtains identification data for the mobile DPS from a security module of the mobile DPS. The tracking station uses the identification data to obtain credentials to access secure storage on the mobile DPS. The tracking station automatically generates security configuration data for the mobile DPS, based on multiple factors pertaining to the mobile DPS, such as identity of the mobile DPS, a location of the mobile DPS, capabilities of the mobile DPS, etc. The tracking station uses the credentials to write the security configuration data to the secure storage of the mobile DPS. The security configuration data calls for the mobile DPS to automatically disable or enable at least one component. Other embodiments are described and claimed.Type: ApplicationFiled: December 4, 2014Publication date: December 31, 2015Applicant: McAfee, Inc.Inventors: Rajesh Poornachandran, Shahrokh Shahidzadeh, Sudeep Das, Vincent J. Zimmer, Sumant Vashisth, Pramod Sharma