Patents by Inventor Pramod Sharma

Pramod Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240091953
    Abstract: A method for controlling a robotic system includes determining a location and/or a pose of a power system component based on data received from one or more sensors, and determining a mapping of a location of a robotic system within a model of an external environment of the robotic system based on the data. The model of the external environment provides locations of objects external to the robotic system. A sequence of movements of components of the robotic system is determined to perform maintenance on the power system component based on the locations of the objects external to the robotic system and/or the location or pose of the power system component. One or more control signals are communicated to remotely control movement of the components of the robotic system based on the sequence or movements of the components to perform maintenance on the power system component.
    Type: Application
    Filed: November 30, 2023
    Publication date: March 21, 2024
    Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
  • Patent number: 11909769
    Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein. An example apparatus includes at least one memory, and at least one processor to execute instructions to at least identify one or more non-sensitive parameters of a plurality of policy parameters and one or more sensitive parameters of the plurality of the policy parameters, the plurality of the policy parameters obtained from a computing device in response to a request from a cloud analytics server for the plurality of the policy parameters, encrypt the one or more sensitive parameters to generate encrypted parameter data in response to the identification of the one or more sensitive parameters, and transmit the encrypted parameter data to the cloud analytics server, the cloud analytics server to curry a security policy function based on one or more of the plurality of the policy parameters.
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: February 20, 2024
    Assignee: MUSARUBRA US LLC
    Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
  • Publication number: 20240028350
    Abstract: An example machine learning or AI-driven method may include generating a document interface including a document content region configured to display textual and graphical document elements; that the document interface including a visualization input component that is user-selectable to input visualization object elements; providing the document interface for presentation via an output device of a computing device associated with a user; receiving a first input via an input device associated with the computing device; predicting one or more first visualization object elements based on the first input; and updating the document interface to include the one or more predicted first visualization object elements as one or more suggestions.
    Type: Application
    Filed: October 15, 2021
    Publication date: January 25, 2024
    Inventors: Pramod Sharma, Jerome Scholler
  • Patent number: 11865732
    Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.
    Type: Grant
    Filed: April 30, 2021
    Date of Patent: January 9, 2024
    Assignee: Transportation IP Holdings, LLC
    Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
  • Publication number: 20230151233
    Abstract: Digital ink formulations that cure by the application of light emitting diode (LED) energy are described. Also described are methods of bonding the LED-curable formulations onto substrates.
    Type: Application
    Filed: April 9, 2021
    Publication date: May 18, 2023
    Inventors: Pramod SHARMA, Shawn ROBERTS, James DEININGER, Michelle PEARCE
  • Publication number: 20210252712
    Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.
    Type: Application
    Filed: April 30, 2021
    Publication date: August 19, 2021
    Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
  • Publication number: 20210168176
    Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein. An example apparatus includes at least one memory, and at least one processor to execute instructions to at least identify one or more non-sensitive parameters of a plurality of policy parameters and one or more sensitive parameters of the plurality of the policy parameters, the plurality of the policy parameters obtained from a computing device in response to a request from a cloud analytics server for the plurality of the policy parameters, encrypt the one or more sensitive parameters to generate encrypted parameter data in response to the identification of the one or more sensitive parameters, and transmit the encrypted parameter data to the cloud analytics server, the cloud analytics server to curry a security policy function based on one or more of the plurality of the policy parameters.
    Type: Application
    Filed: January 20, 2021
    Publication date: June 3, 2021
    Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
  • Patent number: 11020859
    Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.
    Type: Grant
    Filed: January 4, 2019
    Date of Patent: June 1, 2021
    Assignee: TRANSPORTATION IP HOLDINGS, LLC
    Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
  • Patent number: 10911496
    Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein.
    Type: Grant
    Filed: August 12, 2019
    Date of Patent: February 2, 2021
    Assignee: MCAFEE, LLC
    Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
  • Patent number: 10493629
    Abstract: A robotic system includes one or more optical sensors configured to separately obtain two dimensional (2D) image data and three dimensional (3D) image data of a brake lever of a vehicle, a manipulator arm configured to grasp the brake lever of the vehicle, and a controller configured to compare the 2D image data with the 3D image data to identify one or more of a location or a pose of the brake lever of the vehicle. The controller is configured to control the manipulator arm to move toward, grasp, and actuate the brake lever of the vehicle based on the one or more of the location or the pose of the brake lever.
    Type: Grant
    Filed: January 5, 2017
    Date of Patent: December 3, 2019
    Assignee: GE GLOBAL SOURCING LLC
    Inventors: Arpit Jain, Charles Burton Theurer, Balajee Kannan, Shiraj Sen, Pramod Sharma, Shuai Li, Shubao Liu
  • Publication number: 20190364074
    Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein.
    Type: Application
    Filed: August 12, 2019
    Publication date: November 28, 2019
    Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
  • Patent number: 10382489
    Abstract: Technologies for privacy-safe security policy evaluation include a cloud analytics server, a trusted data access mediator (TDAM) device, and one or more client devices. The cloud analytics server curries a security policy function to generate a privacy-safe curried function set. The cloud analytics server requests parameter data from the TDAM device, which collects the parameter data, identifies sensitive parameter data, encrypts the sensitive parameter data, and transmits the encrypted sensitive parameter data to the cloud analytics server. The cloud analytics server evaluates one or more curried functions using non-sensitive parameters to generate one or more sensitive functions that each take a sensitive parameter. The cloud analytics server transmits the sensitive functions and the encrypted sensitive parameters to a client computing device, which decrypts the encrypted sensitive parameters and evaluates the sensitive functions with the sensitive parameters to return a security policy.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: August 13, 2019
    Assignee: Mcafee, LLC
    Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
  • Publication number: 20190134821
    Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.
    Type: Application
    Filed: January 4, 2019
    Publication date: May 9, 2019
    Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wilson Wheeler, Tai-Peng Tian
  • Publication number: 20180191780
    Abstract: Technologies for privacy-safe security policy evaluation include a cloud analytics server, a trusted data access mediator (TDAM) device, and one or more client devices. The cloud analytics server curries a security policy function to generate a privacy-safe curried function set. The cloud analytics server requests parameter data from the TDAM device, which collects the parameter data, identifies sensitive parameter data, encrypts the sensitive parameter data, and transmits the encrypted sensitive parameter data to the cloud analytics server. The cloud analytics server evaluates one or more curried functions using non-sensitive parameters to generate one or more sensitive functions that each take a sensitive parameter. The cloud analytics server transmits the sensitive functions and the encrypted sensitive parameters to a client computing device, which decrypts the encrypted sensitive parameters and evaluates the sensitive functions with the sensitive parameters to return a security policy.
    Type: Application
    Filed: December 29, 2016
    Publication date: July 5, 2018
    Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
  • Publication number: 20170341236
    Abstract: A robotic system includes a controller configured to obtain image data from one or more optical sensors and to determine one or more of a location and/or pose of a vehicle component based on the image data. The controller also is configured to determine a model of an external environment of the robotic system based on the image data and to determine tasks to be performed by components of the robotic system to perform maintenance on the vehicle component. The controller also is configured to assign the tasks to the components of the robotic system and to communicate control signals to the components of the robotic system to autonomously control the robotic system to perform the maintenance on the vehicle component.
    Type: Application
    Filed: October 13, 2016
    Publication date: November 30, 2017
    Inventors: Romano Patrick, Shiraj Sen, Arpit Jain, Huan Tan, Yonatan Gefen, Shuai Li, Shubao Liu, Pramod Sharma, Balajee Kannan, Viktor Holovashchenko, Douglas Forman, John Michael Lizzi, Charles Burton Theurer, Omar Al Assad, Ghulam Ali Baloch, Frederick Wheeler
  • Publication number: 20170341237
    Abstract: A robotic system includes one or more optical sensors configured to separately obtain two dimensional (2D) image data and three dimensional (3D) image data of a brake lever of a vehicle, a manipulator arm configured to grasp the brake lever of the vehicle, and a controller configured to compare the 2D image data with the 3D image data to identify one or more of a location or a pose of the brake lever of the vehicle. The controller is configured to control the manipulator arm to move toward, grasp, and actuate the brake lever of the vehicle based on the one or more of the location or the pose of the brake lever.
    Type: Application
    Filed: January 5, 2017
    Publication date: November 30, 2017
    Inventors: Arpit Jain, Charles Burton Theurer, Balajee Kannan, Shiraj Sen, Pramod Sharma, Shuai Li, Shubao Liu
  • Patent number: 9596257
    Abstract: A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In practice, a shim application registers with a mobile device's operating system to intercept application installation operations. Upon intercepting an attempted installation operation, the shim application identifies the application seeking to be installed, generates a key uniquely identifying the application, and transmits the key over a network connection to a back-end server. The back-end server may be configured to crawl the Internet to identify malicious applications and compile and maintain a database of such applications. Upon receiving a key from the shim application, the back-end server can search its database to locate a matching application and, if found, respond to the mobile device with the application's status (e.g., malicious or not). The shim application can utilize this information to allow or block installation of the application.
    Type: Grant
    Filed: September 11, 2015
    Date of Patent: March 14, 2017
    Assignee: McAfee, Inc.
    Inventors: Sudeep Das, Jayasankar Divakarla, Pramod Sharma
  • Patent number: 9536057
    Abstract: Premise-based policies can be applied in the management of mobile devices and other computing devices within a system. A computing device is detected using close proximity wireless communication and location information is sent to the computing device using close proximity wireless communication. Policies applied to the computing device can be based at least in part on the location information.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: January 3, 2017
    Assignee: McAfee, Inc.
    Inventors: Sudeep Das, Pramod Sharma, Sumant Vashisth
  • Publication number: 20160006757
    Abstract: A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In practice, a shim application registers with a mobile device's operating system to intercept application installation operations. Upon intercepting an attempted installation operation, the shim application identifies the application seeking to be installed, generates a key uniquely identifying the application, and transmits the key over a network connection to a back-end server. The back-end server may be configured to crawl the Internet to identify malicious applications and compile and maintain a database of such applications. Upon receiving a key from the shim application, the back-end server can search its database to locate a matching application and, if found, respond to the mobile device with the application's status (e.g., malicious or not). The shim application can utilize this information to allow or block installation of the application.
    Type: Application
    Filed: September 11, 2015
    Publication date: January 7, 2016
    Applicant: McAfee, Inc.
    Inventors: Sudeep Das, Jayasankar Divakarla, Pramod Sharma
  • Publication number: 20150381658
    Abstract: A tracking station detects a mobile data processing system (DPS) within communication range of a short range wireless module of the tracking station. In response to detecting the mobile DPS, the tracking station obtains identification data for the mobile DPS from a security module of the mobile DPS. The tracking station uses the identification data to obtain credentials to access secure storage on the mobile DPS. The tracking station automatically generates security configuration data for the mobile DPS, based on multiple factors pertaining to the mobile DPS, such as identity of the mobile DPS, a location of the mobile DPS, capabilities of the mobile DPS, etc. The tracking station uses the credentials to write the security configuration data to the secure storage of the mobile DPS. The security configuration data calls for the mobile DPS to automatically disable or enable at least one component. Other embodiments are described and claimed.
    Type: Application
    Filed: December 4, 2014
    Publication date: December 31, 2015
    Applicant: McAfee, Inc.
    Inventors: Rajesh Poornachandran, Shahrokh Shahidzadeh, Sudeep Das, Vincent J. Zimmer, Sumant Vashisth, Pramod Sharma